ZyXEL NWD-270N User Guide - Page 43

Station Mode, 4.1 Overview, 4.1.1 What You Can Do in This What You Need to Know

Page 43 highlights

CHAPTER 4 Station Mode 4.1 Overview This section shows you how to configure your NWD-270N using the ZyXEL utility in Windows. " Some features available in Windows XP or Windows 2000 are not available in Windows Vista. 4.1.1 What You Can Do in This Section • On the Link Info screen, you can see your current connection details, monitor signal strength and quality, and more. See Section 4.3 on page 45 for details. • On the Site Survey screen, you can connect to any available unsecured wireless network in range of the NWD-270N, or open the security settings screen for any secured wireless network in range. See Section 4.4 on page 47 for details.\ • On the Profile screen, you can create, delete and manage your wireless network profiles. See Section 4.5 on page 53 for details. • On the Adapter screen, you can configure the NWD-270N hardware, such as activating WPS mode or its power saving feature. See Section 4.6 on page 58 for details. 4.1.2 What You Need to Know The following terms and concepts may help as you read through this section. Wired Equivalent Privacy (WEP) WEP (Wired Equivalent Privacy) encrypts data transmitted between wired and wireless networks to keep the transmission private. Although one of the original wireless encryption protocols, WEP is also the weakest. Many people use it strictly to deter unintentional usage of their wireless network by outsiders. Wi-fi Protected Access (WPA) Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. It improves data encryption by using Temporal Key Integrity Protocol (TKIP), Message Integrity Check (MIC) and IEEE 802.1x. WPA uses Advanced Encryption Standard (AES) in the Counter mode with Cipher block chaining Message authentication code Protocol (CCMP) to offer stronger NWD-270N User's Guide 43

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140

NWD-270N User’s Guide
43
C
HAPTER
4
Station Mode
4.1
Overview
This section shows you how to configure your NWD-270N using the ZyXEL utility in
Windows.
Some features available in Windows XP or Windows 2000 are not available in
Windows Vista.
4.1.1
What You Can Do in This Section
On the
Link Info
screen, you can see your current connection details, monitor signal
strength and quality, and more. See
Section 4.3 on page 45
for details.
On the
Site Survey
screen, you can connect to any available unsecured wireless network
in range of the NWD-270N, or open the security settings screen for any secured wireless
network in range. See
Section 4.4 on page 47
for details.\
On the
Profile
screen, you can create, delete and manage your wireless network profiles.
See
Section 4.5 on page 53
for details.
On the
Adapter
screen, you can configure the NWD-270N hardware, such as activating
WPS mode or its power saving feature. See
Section 4.6 on page 58
for details.
4.1.2
What You Need to Know
The following terms and concepts may help as you read through this section.
Wired Equivalent Privacy (WEP)
WEP (Wired Equivalent Privacy) encrypts data transmitted between wired and wireless
networks to keep the transmission private. Although one of the original wireless encryption
protocols, WEP is also the weakest. Many people use it strictly to deter unintentional usage of
their wireless network by outsiders.
Wi-fi Protected Access (WPA)
Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. It improves data
encryption by using Temporal Key Integrity Protocol (TKIP), Message Integrity Check (MIC)
and IEEE 802.1x. WPA uses Advanced Encryption Standard (AES) in the Counter mode with
Cipher block chaining Message authentication code Protocol (CCMP) to offer stronger