ZyXEL NBG2105 User Guide - Page 84
What You Should Know - pass
View all ZyXEL NBG2105 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 84 highlights
Chapter 13 Wireless LAN • Use the Site Survey screen to scan for and connect to a wireless network automatically. (Section 13.6 on page 92) • Use the WPS screen to quickly set up a wireless network with strong security, without having to configure security settings manually (Section 13.8 on page 95). • Use the MAC Filtering screen to allow or deny wireless stations based on their MAC addresses from connecting to the NBG2105 (Section 13.9 on page 97). 13.1.2 What You Should Know Every wireless network must follow these basic guidelines. • Every wireless client in the same wireless network must use the same SSID. The SSID is the name of the wireless network. It stands for Service Set IDentity. • If two wireless networks overlap, they should use different channels. Like radio stations or television channels, each wireless network uses a specific channel, or frequency, to send and receive information. • Every wireless client in the same wireless network must use security compatible with the AP. Security stops unauthorized devices from using the wireless network. It can also protect the information that is sent in the wireless network. Wireless Security Overview The following sections introduce different types of wireless security you can set up in the wireless network. SSID Normally, the AP acts like a beacon and regularly broadcasts the SSID in the area. You can hide the SSID instead, in which case the AP does not broadcast the SSID. In addition, you should change the default SSID to something that is difficult to guess. This type of security is fairly weak, however, because there are ways for unauthorized devices to get the SSID. In addition, unauthorized devices can still see the information that is sent in the wireless network. Authentication Authentication is the process of confirming a client's user name and password when they connect to a network. Turning off authentication means allowing anyone to connect to the network. Encryption Wireless networks can use encryption to protect the information that is sent in the wireless network. It is the process of taking data and encoding it, usually using a secret code, so that it becomes unreadable unless decrypted with the proper code or pass phrase. If you do not know the secret code, you cannot understand the message. 84 NBG2105 User's Guide