
Chapter 7 Wireless LAN
P-2812HNU-51c User’s Guide
150
characters
2
; for example, 00A0C5000002 or 00:A0:C5:00:00:02. To get the MAC
address for each device in the wireless network, see the device’s User’s Guide or
other documentation.
You can use the MAC address filter to tell the P-2812HNU-51c which devices are
allowed or not allowed to use the wireless network. If a device is allowed to use
the wireless network, it still has to have the correct information (SSID, channel,
and security). If a device is not allowed to use the wireless network, it does not
matter if it has the correct information.
This type of security does not protect the information that is sent in the wireless
network. Furthermore, there are ways for unauthorized wireless devices to get the
MAC address of an authorized device. Then, they can use that MAC address to use
the wireless network.
7.10.3.3 User Authentication
Authentication is the process of verifying whether a wireless device is allowed to
use the wireless network. You can make every user log in to the wireless network
before they can use it. However, every device in the wireless network has to
support IEEE 802.1x to do this.
For wireless networks, you can store the user names and passwords for each user
in a RADIUS server. This is a server used in businesses more than in homes. If you
do not have a RADIUS server, you cannot set up user names and passwords for
your users.
Unauthorized wireless devices can still see the information that is sent in the
wireless network, even if they cannot use the wireless network. Furthermore,
there are ways for unauthorized wireless users to get a valid user name and
password. Then, they can use that user name and password to use the wireless
network.
7.10.3.4 Encryption
Wireless networks can use encryption to protect the information that is sent in the
wireless network. Encryption is like a secret code. If you do not know the secret
code, you cannot understand the message.
1.
Some wireless devices, such as scanners, can detect wireless networks but cannot use wireless networks.
These kinds of wireless devices might not have MAC addresses.
2.
Hexadecimal characters are 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, and F.
Summary of Contents for P-2812HNU-51c
Page 2: ......
Page 8: ...Safety Warnings P 2812HNU 51c User s Guide 8 ...
Page 10: ...Contents Overview P 2812HNU 51c User s Guide 10 ...
Page 19: ...19 PART I User s Guide ...
Page 20: ...20 ...
Page 73: ...73 PART II Technical Reference ...
Page 74: ...74 ...
Page 88: ...Chapter 4 Status Screens P 2812HNU 51c User s Guide 88 ...
Page 118: ...Chapter 5 WAN Setup P 2812HNU 51c User s Guide 118 ...
Page 204: ...Chapter 9 Voice P 2812HNU 51c User s Guide 204 ...
Page 210: ...Chapter 10 File Sharing P 2812HNU 51c User s Guide 210 ...
Page 216: ...Chapter 11 Firewall P 2812HNU 51c User s Guide 216 ...
Page 223: ...Chapter 12 Certificate P 2812HNU 51c User s Guide 223 Figure 99 Certificate Details ...
Page 232: ...Chapter 13 Static Route P 2812HNU 51c User s Guide 232 ...
Page 236: ...Chapter 14 Policy Forwarding P 2812HNU 51c User s Guide 236 ...
Page 252: ...Chapter 16 Quality of Service QoS P 2812HNU 51c User s Guide 252 ...
Page 274: ...Chapter 19 Universal Plug and Play UPnP P 2812HNU 51c User s Guide 274 ...
Page 284: ...Chapter 21 Interface Group P 2812HNU 51c User s Guide 284 ...
Page 288: ...Chapter 22 System Settings P 2812HNU 51c User s Guide 288 ...
Page 292: ...Chapter 23 Logs P 2812HNU 51c User s Guide 292 ...
Page 300: ...Chapter 24 Tools P 2812HNU 51c User s Guide 300 ...
Page 320: ...Chapter 27 Product Specifications P 2812HNU 51c User s Guide 320 ...
Page 336: ...Appendix A Network Troubleshooting P 2812HNU 51c User s Guide 336 ...
Page 376: ...Appendix C Pop up Windows JavaScripts and Java Permissions P 2812HNU 51c User s Guide 376 ...
Page 388: ...Appendix D IP Addresses and Subnetting P 2812HNU 51c User s Guide 388 ...