ZyXEL NWD2705 User Guide - Page 35

ZyXEL Utility: Station Mode

Page 35 highlights

CHAPTER 4 ZyXEL Utility: Station Mode 4.1 Overview This section shows you how to configure your NWD2705 using the ZyXEL utility in Windows. 4.1.1 What You Can Do in This Section • On the Link Info screen, you can see your current connection details, monitor signal strength and quality, and more. See Section 4.3 on page 37 for details. • On the Site Survey screen, you can connect to any available unsecured wireless network in range of the NWD2705, or open the security settings screen for any secured wireless network in range. See Section 4.4 on page 39 for details. • On the Profile screen, you can create, delete and manage your wireless network profiles. See Section 4.5 on page 43 for details. • On the Adapter screen, you can select the frequency bands that the NWD2705 uses and enable WPS to set up a wireless network automatically. See Section 4.6 on page 48 for details. 4.1.2 What You Need to Know The following terms and concepts may help as you read through this section. Wired Equivalent Privacy (WEP) WEP (Wired Equivalent Privacy) encrypts data transmitted between wired and wireless networks to keep the transmission private. Although one of the original wireless encryption protocols, WEP is also the weakest. Many people use it strictly to deter unintentional usage of their wireless network by outsiders. Wi-Fi Protected Access (WPA) Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. It improves data encryption by using Temporal Key Integrity Protocol (TKIP), Message Integrity Check (MIC) and IEEE 802.1x. WPA uses Advanced Encryption Standard (AES) in the Counter mode with Cipher block chaining Message authentication code Protocol (CCMP) to offer stronger encryption than TKIP. WPA applies IEEE 802.1x and Extensible Authentication Protocol (EAP) to authenticate wireless clients using an external RADIUS database. The WPA protocol affords users with vastly stronger security than the WEP protocol. It comes in two different varieties: WPA and WPA2. Always try to use WPA2 as it implements the full version of the security standard while WPA does not. NWD2705 User's Guide 35

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68

NWD2705 User’s Guide
35
C
HAPTER
4
ZyXEL Utility: Station Mode
4.1
Overview
This section shows you how to configure your NWD2705 using the ZyXEL utility in Windows.
4.1.1
What You Can Do in This Section
On the
Link Info
screen, you can see your current connection details, monitor signal strength
and quality, and more. See
Section 4.3 on page 37
for details.
On the
Site Survey
screen, you can connect to any available unsecured wireless network in
range of the NWD2705, or open the security settings screen for any secured wireless network in
range. See
Section 4.4 on page 39
for details.
On the
Profile
screen, you can create, delete and manage your wireless network profiles. See
Section 4.5 on page 43
for details.
On the
Adapter
screen, you can select the frequency bands that the NWD2705 uses and enable
WPS to set up a wireless network automatically. See
Section 4.6 on page 48
for details.
4.1.2
What You Need to Know
The following terms and concepts may help as you read through this section.
Wired Equivalent Privacy (WEP)
WEP (Wired Equivalent Privacy) encrypts data transmitted between wired and wireless networks to
keep the transmission private. Although one of the original wireless encryption protocols, WEP is
also the weakest. Many people use it strictly to deter unintentional usage of their wireless network
by outsiders.
Wi-Fi Protected Access (WPA)
Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. It improves data encryption
by using Temporal Key Integrity Protocol (TKIP), Message Integrity Check (MIC) and IEEE 802.1x.
WPA uses Advanced Encryption Standard (AES) in the Counter mode with Cipher block chaining
Message authentication code Protocol (CCMP) to offer stronger encryption than TKIP. WPA applies
IEEE 802.1x and Extensible Authentication Protocol (EAP) to authenticate wireless clients using an
external RADIUS database. The WPA protocol affords users with vastly stronger security than the
WEP protocol. It comes in two different varieties: WPA and WPA2. Always try to use WPA2 as it
implements the full version of the security standard while WPA does not.