User guide

Overview
Chapter 7: Configuring a Wireless Network 115
Security
Protocol
Description
WEP encryption In the WEP (Wired Equivalent Privacy) encryption security method, wireless
stations must use a pre-shared key to connect to your network. This method
is not recommended, due to known security flaws in the WEP protocol. It is
provided for compatibility with existing wireless deployments.
Note: The router and the wireless stations must be configured with the same
WEP key.
WPA-Personal:
password
authentication,
encryption
The WPA-Personal (Wi-Fi Protected Access) security method (also called
WPA-PSK) uses MIC (message integrity check) to ensure the integrity of
messages, and TKIP (Temporal Key Integrity Protocol) to enhance data
encryption. WPA-Personal periodically changes and authenticates encryption
keys. This is called rekeying.
This option is recommended for small networks, which want to authenticate
and encrypt wireless data.
Note: The router and the wireless stations must be configured with the same
passphrase.
WPA2 (802.11i) The WPA2 security method uses the more secure Advanced Encryption
Standard (AES) cipher, instead of the RC4 cipher used by WPA and WEP.
When using the WPA-Personal security methods, the ZoneAlarm enables you
to restrict access to the WLAN network to wireless stations that support the
WPA2 security method. If this setting is not selected, the ZoneAlarm router
allows clients to connect using both WPA and WPA2.