ZyXEL NBG6615 User Guide - Page 56

MAC Address Filter, 6.3.4 Encryption, 6.3.5 WPS, WPA2-PSK, WPA-PSK/WPA2-PSK, NO AUTHENTICATION

Page 56 highlights

Chapter 6 Wireless LAN 6.3.3 MAC Address Filter Every wireless client has a unique identification number, called a MAC address.1 A MAC address is usually written using twelve hexadecimal characters2; for example, 00A0C5000002 or 00:A0:C5:00:00:02. To get the MAC address for each wireless client, see the appropriate User's Guide or other documentation. You can use the MAC address filter to tell the AP which wireless clients are allowed or not allowed to use the wireless network. If a wireless client is allowed to use the wireless network, it still has to have the correct settings (SSID, channel, and security). If a wireless client is not allowed to use the wireless network, it does not matter if it has the correct settings. This type of security does not protect the information that is sent in the wireless network. Furthermore, there are ways for unauthorized devices to get the MAC address of an authorized wireless client. Then, they can use that MAC address to use the wireless network. 6.3.4 Encryption Wireless networks can use encryption to protect the information that is sent in the wireless network. Encryption is like a secret code. If you do not know the secret code, you cannot understand the message. Table 12 Types of Encryption for Each Type of Authentication NO AUTHENTICATION Weakest No Security Strongest WPA-PSK/WPA2-PSK WPA2-PSK For example, if users do not log in to the wireless network, you can choose no encryption,WPA2-PSK, or WPA-PSK/WPA2-PSK. It is recommended that wireless networks use WPA2-PSK or stronger encryption if supported. If you have older devices that don't support WPA2-PSK, select WPA-PSK/WPA2-PSK, which allows newer devices to use WPA2-PSK and legacy devices to use WPA-PSK. Many types of encryption use a key to protect the information in the wireless network. The longer the key, the stronger the encryption. Every wireless client in the wireless network must have the same key. 6.3.5 WPS Wi-Fi Protected Setup (WPS) is an industry standard specification, defined by the Wi-Fi Alliance. WPS allows you to quickly set up a wireless network with strong security, without having to configure security settings manually. Depending on the devices in your network, you can either press a button (on the device itself, or in its configuration utility) or enter a PIN (Personal Identification Number) in the devices. Then, they connect and set up a secure network by themselves. See how to set up a secure wireless network using WPS in the Section 5.3 on page 39. 1. Some wireless devices, such as scanners, can detect wireless networks but cannot use wireless networks. These kinds of wireless devices might not have MAC addresses. 2. Hexadecimal characters are 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, and F. NBG6615's User's Guide 56

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216

Chapter 6 Wireless LAN
NBG6615’s User’s Guide
56
6.3.3
MAC Address Filter
Every wireless client has a unique identification number, called a MAC address.
1
A MAC address is
usually written using twelve hexadecimal characters
2
; for example, 00A0C5000002 or 00:A0:C5:00:00:02.
To get the MAC address for each wireless client, see the appropriate User’s Guide or other
documentation.
You can use the MAC address filter to tell the AP which wireless clients are allowed or not allowed to use
the wireless network. If a wireless client is allowed to use the wireless network, it still has to have the
correct settings (SSID, channel, and security). If a wireless client is not allowed to use the wireless
network, it does not matter if it has the correct settings.
This type of security does not protect the information that is sent in the wireless network. Furthermore,
there are ways for unauthorized devices to get the MAC address of an authorized wireless client. Then,
they can use that MAC address to use the wireless network.
6.3.4
Encryption
Wireless networks can use encryption to protect the information that is sent in the wireless network.
Encryption is like a secret code. If you do not know the secret code, you cannot understand the
message.
For example, if users do not log in to the wireless network, you can choose no encryption,WPA2-PSK, or
WPA-PSK/WPA2-PSK.
It is recommended that wireless networks use WPA2-PSK or stronger encryption if supported. If you have
older devices that don't support
WPA2-PSK
, select
WPA-PSK/WPA2-PSK
, which allows newer devices to
use
WPA2-PSK
and legacy devices to use
WPA-PSK
.
Many types of encryption use a key to protect the information in the wireless network. The longer the
key, the stronger the encryption. Every wireless client in the wireless network must have the same key.
6.3.5
WPS
Wi-Fi Protected Setup (WPS) is an industry standard specification, defined by the Wi-Fi Alliance. WPS
allows you to quickly set up a wireless network with strong security, without having to configure security
settings manually. Depending on the devices in your network, you can either press a button (on the
device itself, or in its configuration utility) or enter a PIN (Personal Identification Number) in the devices.
Then, they connect and set up a secure network by themselves. See how to set up a secure wireless
network using WPS in the
Section 5.3 on page 39
.
1.
Some wireless devices, such as scanners, can detect wireless networks but cannot use wireless networks. These
kinds of wireless devices might not have MAC addresses.
2.
Hexadecimal characters are 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, and F.
Table 12
Types of Encryption for Each Type of Authentication
NO AUTHENTICATION
Weakest
No Security
WPA-PSK/WPA2-PSK
Strongest
WPA2-PSK