ZyXEL X650 User Guide - Page 101

Security Tips for Wireless Network

Page 101 highlights

Configure Click 'Start PBC' to start Push-Button style WPS by Push Button (4): setup procedure. This wireless router will wait for WPS requests from wireless clients for 2 minutes. The 'WLAN' LED on the wireless router will be steadily on for 2 minutes when this wireless router is waiting for incoming WPS requests. Configure by client PinCode (5): Please input the PIN code of the wireless client you wish to connect to, and click 'Start PIN' button. The 'WLAN' LED on the wireless router will be steadily on when this wireless router is waiting for incoming WPS requests. 8.6 Security Tips for Wireless Network Here are some quick tips to help you improve the security level of your wireless network: 1. Never use simple words (like school, apple or computer) as a WEP encryption or WPA passphrase. 2. A complicated (the combination of number, alphabet, even symbol, and long enough) WEP key and WPA passphrase is much safer than simple and short ones. Remember that the wireless client can keep the key or passphrase for you, so you only have to input the complicated key or passphrase once. It is not too difficult, but will greatly improve your security level. 3. You can hide the ESSID of this router by setting the 'Broadcast ESSID' option to 'Disable'. Your wireless router will not be found by other people in proximity if they are just using the AP scanning function of their wireless client, and this can reduce the chance of being intruded. 4. Use 'Access Control' function described in section 8.4 so that people who 99

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152

99
Configure
Click ‘Start PBC’ to start Push-Button style WPS
by Push Button (4):
setup procedure. This wireless router will wait for WPS
requests from wireless clients for 2 minutes. The ‘WLAN’
LED on the wireless router will be steadily on for 2
minutes when this wireless router is waiting for incoming
WPS requests.
Configure
Please input the PIN code of the wireless client you
by client
wish to connect to, and click ‘Start PIN’ button.
PinCode (5):
The ‘WLAN’ LED on the wireless router will be steadily
on when this wireless router is waiting for incoming WPS
requests.
8.6 Security Tips for Wireless Network
Here are some quick tips to help you improve the security level of your
wireless network:
1.
Never use simple words (like school, apple or computer) as a WEP
encryption or WPA passphrase.
2.
A complicated (the combination of number, alphabet, even symbol, and
long enough) WEP key and WPA passphrase is much safer than simple and
short ones. Remember that the wireless client can keep the key or
passphrase for you, so you only have to input the complicated key or
passphrase once. It is not too difficult, but will greatly improve your
security level.
3.
You can hide the ESSID of this router by setting the ‘Broadcast ESSID’
option to ‘Disable’. Your wireless router will not be found by other people
in proximity if they are just using the AP scanning function of their wireless
client, and this can reduce the chance of being intruded.
4.
Use ‘Access Control’ function described in section 8.4 so that people who