ZyXEL NWD2705 User Guide - Page 35
ZyXEL Utility: Station Mode
View all ZyXEL NWD2705 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 35 highlights
CHAPTER 4 ZyXEL Utility: Station Mode 4.1 Overview This section shows you how to configure your NWD2705 using the ZyXEL utility in Windows. 4.1.1 What You Can Do in This Section • On the Link Info screen, you can see your current connection details, monitor signal strength and quality, and more. See Section 4.3 on page 37 for details. • On the Site Survey screen, you can connect to any available unsecured wireless network in range of the NWD2705, or open the security settings screen for any secured wireless network in range. See Section 4.4 on page 39 for details. • On the Profile screen, you can create, delete and manage your wireless network profiles. See Section 4.5 on page 43 for details. • On the Adapter screen, you can select the frequency bands that the NWD2705 uses and enable WPS to set up a wireless network automatically. See Section 4.6 on page 48 for details. 4.1.2 What You Need to Know The following terms and concepts may help as you read through this section. Wired Equivalent Privacy (WEP) WEP (Wired Equivalent Privacy) encrypts data transmitted between wired and wireless networks to keep the transmission private. Although one of the original wireless encryption protocols, WEP is also the weakest. Many people use it strictly to deter unintentional usage of their wireless network by outsiders. Wi-Fi Protected Access (WPA) Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. It improves data encryption by using Temporal Key Integrity Protocol (TKIP), Message Integrity Check (MIC) and IEEE 802.1x. WPA uses Advanced Encryption Standard (AES) in the Counter mode with Cipher block chaining Message authentication code Protocol (CCMP) to offer stronger encryption than TKIP. WPA applies IEEE 802.1x and Extensible Authentication Protocol (EAP) to authenticate wireless clients using an external RADIUS database. The WPA protocol affords users with vastly stronger security than the WEP protocol. It comes in two different varieties: WPA and WPA2. Always try to use WPA2 as it implements the full version of the security standard while WPA does not. NWD2705 User's Guide 35