Security parameters summary – ZyXEL Communications P-660HN-TxA User Manual

Page 304

Advertising
background image

Appendix D Wireless LANs

P-660HN-TxA User’s Guide

304

4

The AP and wireless clients use the TKIP or AES encryption process, the PMK and
information exchanged in a handshake to create temporal encryption keys. They
use these keys to encrypt data exchanged between them.

Figure 165 WPA(2)-PSK Authentication

Security Parameters Summary

Refer to this table to see what other security parameters you should configure for
each authentication method or key management protocol type. MAC address
filters are not dependent on how you configure these security features.

Table 113 Wireless Security Relational Matrix

AUTHENTICATION
METHOD/ KEY
MANAGEMENT
PROTOCOL

ENCRYPTIO
N METHOD

ENTER
MANUAL KEY

IEEE 802.1X

Open

None

No

Disable
Enable without Dynamic WEP
Key

Open

WEP

No

Enable with Dynamic WEP Key

Yes

Enable without Dynamic WEP
Key

Yes

Disable

Shared

WEP

No

Enable with Dynamic WEP Key

Yes

Enable without Dynamic WEP
Key

Yes

Disable

WPA

TKIP/AES

No

Enable

WPA-PSK

TKIP/AES

Yes

Disable

WPA2

TKIP/AES

No

Enable

WPA2-PSK

TKIP/AES

Yes

Disable

Advertising