Previous Topic

Next Topic

Book Contents

Book Index

Wireless Security Protocols

The ZoneAlarm wireless security router supports the following security protocols:

Wireless Security Protocols

Security Protocol



No security method is used. This option is not recommended, because it allows unauthorized users to access your WLAN network, although you can still limit access from the WLAN by creating firewall rules. This method is suitable for creating public access points.

WEP encryption

In the WEP (Wired Equivalent Privacy) encryption security method, wireless stations must use a pre-shared key to connect to your network. This method is not recommended, due to known security flaws in the WEP protocol. It is provided for compatibility with existing wireless deployments.

Note: The router and the wireless stations must be configured with the same WEP key.

WPA-Personal: password authentication, encryption

The WPA-Personal (Wi-Fi Protected Access) security method (also called WPA-PSK) uses MIC (message integrity check) to ensure the integrity of messages, and TKIP (Temporal Key Integrity Protocol) to enhance data encryption. WPA-Personal periodically changes and authenticates encryption keys. This is called rekeying.

This option is recommended for small networks, which want to authenticate and encrypt wireless data.

Note: The router and the wireless stations must be configured with the same passphrase.

WPA2 (802.11i)

The WPA2 security method uses the more secure Advanced Encryption Standard (AES) cipher, instead of the RC4 cipher used by WPA and WEP.

When using the WPA-Personal security methods, the ZoneAlarm enables you to restrict access to the WLAN network to wireless stations that support the WPA2 security method. If this setting is not selected, the ZoneAlarm router allows clients to connect using both WPA and WPA2.

See Also


About the Wireless Hardware in Your ZoneAlarm Wireless Router