Figure 112 wpa(2)-psk authentication, Table 26 wireless security relational matrix, Security parameters summary – ZyXEL Communications V660 User Manual

Page 176: Antenna overview

Advertising
background image

Appendix B Wireless LANs

V660 User’s Guide

176

4 The AP and wireless clients use the TKIP or AES encryption process to encrypt data

exchanged between them.

Figure 112 WPA(2)-PSK Authentication

Security Parameters Summary

Refer to this table to see what other security parameters you should configure for each
Authentication Method/ key management protocol type. MAC address filters are not
dependent on how you configure these security features.

Antenna Overview

An antenna couples RF signals onto air. A transmitter within a wireless device sends an RF
signal to the antenna, which propagates the signal through the air. The antenna also operates in
reverse by capturing RF signals from the air.

Table 26 Wireless Security Relational Matrix

AUTHENTICATION

METHOD/ KEY

MANAGEMENT PROTOCOL

ENCRYPTIO

N METHOD

ENTER

MANUAL KEY

IEEE 802.1X

Open

None

No

Disable

Enable without Dynamic WEP Key

Open

WEP

No

Enable with Dynamic WEP Key

Yes

Enable without Dynamic WEP Key

Yes

Disable

Shared

WEP

No

Enable with Dynamic WEP Key

Yes

Enable without Dynamic WEP Key

Yes

Disable

WPA

TKIP/AES

No

Enable

WPA-PSK

TKIP/AES

Yes

Disable

WPA2

TKIP/AES

No

Enable

WPA2-PSK

TKIP/AES

Yes

Disable

Advertising