![ZyXEL Communications P-2601HN(L)-F1 Series User Manual Download Page 100](http://html1.mh-extra.com/html/zyxel-communications/p-2601hn-l-f1-series/p-2601hn-l-f1-series_user-manual_946055100.webp)
Chapter 6 Wireless
P-2601HN(L)-F1 Series User’s Guide
100
You can use the MAC address filter to tell the ZyXEL Device which devices are
allowed or not allowed to use the wireless network. If a device is allowed to use
the wireless network, it still has to have the correct information (SSID, channel,
and security). If a device is not allowed to use the wireless network, it does not
matter if it has the correct information.
This type of security does not protect the information that is sent in the wireless
network. Furthermore, there are ways for unauthorized wireless devices to get the
MAC address of an authorized device. Then, they can use that MAC address to use
the wireless network.
6.7.2.3 User Authentication
Authentication is the process of verifying whether a wireless device is allowed to
use the wireless network. You can make every user log in to the wireless network
before using it. However, every device in the wireless network has to support IEEE
802.1x to do this.
For wireless networks, you can store the user names and passwords for each user
in a RADIUS server. This is a server used in businesses more than in homes. If you
do not have a RADIUS server, you cannot set up user names and passwords for
your users.
Unauthorized wireless devices can still see the information that is sent in the
wireless network, even if they cannot use the wireless network. Furthermore,
there are ways for unauthorized wireless users to get a valid user name and
password. Then, they can use that user name and password to use the wireless
network.
6.7.2.4 Encryption
Wireless networks can use encryption to protect the information that is sent in the
wireless network. Encryption is like a secret code. If you do not know the secret
code, you cannot understand the message.
The types of encryption you can choose depend on the type of authentication.
(See
for information about this.)
Table 19
Types of Encryption for Each Type of Authentication
NO AUTHENTICATION RADIUS SERVER
Weakest
No Security
WPA
Static WEP
WPA-PSK
Strongest
WPA2-PSK
WPA2
Summary of Contents for P-2601HN(L)-F1 Series
Page 2: ......
Page 8: ...Safety Warnings P 2601HN L F1 Series User s Guide 8 ...
Page 10: ...Contents Overview P 2601HN L F1 Series User s Guide 10 ...
Page 19: ...19 PART I User s Guide ...
Page 20: ...20 ...
Page 59: ...59 PART II Technical Reference ...
Page 60: ...60 ...
Page 110: ...Chapter 6 Wireless P 2601HN L F1 Series User s Guide 110 ...
Page 130: ...Chapter 8 Routing P 2601HN L F1 Series User s Guide 130 ...
Page 134: ...Chapter 9 DNS Route P 2601HN L F1 Series User s Guide 134 ...
Page 178: ...Chapter 16 VoIP P 2601HN L F1 Series User s Guide 178 Figure 81 VoIP SIP SIP Service Provider ...
Page 202: ...Chapter 16 VoIP P 2601HN L F1 Series User s Guide 202 ...
Page 206: ...Chapter 17 Logs P 2601HN L F1 Series User s Guide 206 ...
Page 212: ...Chapter 18 System Monitor P 2601HN L F1 Series User s Guide 212 ...
Page 220: ...Chapter 21 SNMP P 2601HN L F1 Series User s Guide 220 ...
Page 232: ...Chapter 26 Backup Restore P 2601HN L F1 Series User s Guide 232 ...
Page 290: ...Appendix B Setting Up Your Computer s IP Address P 2601HN L F1 Series User s Guide 290 ...
Page 322: ...Appendix D Wireless LANs P 2601HN L F1 Series User s Guide 322 ...
Page 332: ...Appendix F Open Software Announcements P 2601HN L F1 Series User s Guide 332 ...
Page 344: ...Index P 2601HN L F1 Series User s Guide 344 ...