Like every other website on the planet, SmallNetBuilder uses cookies. Our cookies track login status, but we only allow admins to log in anyway, so those don't apply to you. Any other cookies you pick up during your visit come from advertisers, which we don't control.
If you continue to use the site, you agree to tolerate our use of cookies. Thank you!

Router Charts

Click for Router Charts

Router Ranker

Click for Router Ranker

NAS Charts

Click for NAS Charts

NAS Ranker

Click for NAS Ranker

More Tools

Click for More Tools

Wireless Reviews

Wireless Features

The ZyAIR's wireless setup (Figure 11) features include the ability to disable the radio, set the ESSID (and also "hide", or disable broadcast of it).

The ZyAIR supports WEP, ESSID hiding, and easy entry for WEP keys

Figure 11: The ZyAIR supports WEP, ESSID hiding, and easy entry for WEP keys

You can see the other setup parameters in Figure 11, most of which you've seen before. Note that the G-2000 doesn't support any form of 802.11g throughput enhancement.

The ZyAIR implements several security features that help keep wireless communications secure, such as supporting Wi-Fi Protected Access (WPA), 802.1x authentication and MAC address filtering.

Tip TIP: For more information about WPA, see our Wi-Fi Protected Access (WPA) NeedToKnow - Part II.

WPA support includes both Pre-Shared Key (PSK) and "enterprise" (RADIUS) modes with TKIP. The optional AES encryption supported by some competitive products is not an option on the G-2000.

802.1x authentication uses a client-sever model that supports centralized user authentication and accounting - usually via a RADIUS server. The RADIUS server provides a single point of authentication, which is more robust and flexible than using static passwords or having to rely on MAC addresses. RADIUS also allows the use of several authentication schemes, including two-factor authentication and using tokens.

While the ZyAIR does not have an onboard RADIUS server, it is capable of passing on authentication requests to an external RADIUS server, which handles the authentication and accounting tasks.

The RADIUS configuration tab - enter the IP of the RADIUS server and the shared secret key

Figure 12: The RADIUS configuration tab - enter the IP of the RADIUS server and the shared secret key

In order to ensure network security, the access point and the RADIUS server use a shared secret key, i.e. password, that both know. The key itself is never sent over the network, but rather an MD5 hash. The ZyAIR supports EAPTLS, EAP-TTLS and PEAP authentication protocols with RADIUS.

More Wireless

Wi-Fi System Tools
Check out our Wi-Fi System Charts, Ranker and Finder!

Support Us!

If you like what we do and want to thank us, just buy something on Amazon. We'll get a small commission on anything you buy. Thanks!


Over In The Forums

Continuation of the first thread which covered beta 1 through 3.Jan 25th: Beta 5 is now available. Changes since Beta 4:Code: 3790c8fe9a Updated docu...
Hi - This week I decided to upgrade my existing AC68U running merlin to an AX86U. I have been spending time today setting up the AX86U and installed M...
I have had FiOS service here for many years (originally through Verizon, now through Frontier) for internet (75/75), TV, & our landline phone. The pho...
Got an XT8 over the holidays. Overall have been very happy with it (uptime of 20 days, great coverage, no incidents, etc).As a result of today's ongoi...
For those of you aching to be beta-testers for the first 6E routers, here's a phone to go with them. Samsung Galaxy S21 Ultra: The Ultimate Smartphon...

Don't Miss These

  • 1
  • 2
  • 3