![ZyXEL Communications P-3202HN-Ba User Manual Download Page 71](http://html1.mh-extra.com/html/zyxel-communications/p-3202hn-ba/p-3202hn-ba_user-manual_945952071.webp)
Chapter 8 Wireless LAN
IAD User’s Guide
71
networks’ coverage areas overlap and you have a variety of networks to choose
from.
Radio Channels
In the radio spectrum, there are certain frequency bands allocated for unlicensed,
civilian use. For the purposes of wireless networking, these bands are divided into
numerous channels. This allows a variety of networks to exist in the same place
without interfering with one another. When you create a network, you must select
a channel to use.
Since the available unlicensed spectrum varies from one country to another, the
number of available channels also varies.
Wireless Security
By their nature, radio communications are simple to intercept. For wireless data
networks, this means that anyone within range of a wireless network without
security can not only read the data passing over the airwaves, but also join the
network. Once an unauthorized person has access to the network she/he can
either steal information or introduce malware (malicious software) intended to
compromise the network. For these reasons, a variety of security systems have
been developed to ensure that only authorized people can use a wireless data
network, or understand the data carried on it.
These security standards do two things. First, they authenticate. This means that
only people presenting the right credentials (often a username and password, or a
“key” phrase) can access the network. Second, they encrypt. This means that the
information sent over the air is encoded. Only people with the code key can
understand the information, and only people who have been authenticated are
given the code key.
These security standards vary in effectiveness. Some can be broken, such as the
old Wired Equivalent Protocol (WEP). Using WEP is better than using no security at
all, but it will not keep a determined attacker out. Other security standards are
secure in themselves but can be broken if a user does not use them properly. For
example, the WPA-PSK security standard is perfectly secure if you use a long key
which is difficult for an attacker’s software to guess - for example, a twenty-letter
long string of apparently random numbers and letters - but it is not very secure if
you use a short key which is very easy to guess.
Because of the damage that can be done by a malicious attacker, it’s not just
people who have sensitive information on their network who should use security.
Everybody who uses any wireless network should ensure that effective security is
in place.
Summary of Contents for P-3202HN-Ba
Page 2: ......
Page 8: ...Safety Warnings IAD User s Guide 8...
Page 10: ...Contents Overview IAD User s Guide 10...
Page 18: ...Table of Contents IAD User s Guide 18...
Page 19: ...19 PART I User s Guide...
Page 20: ...20...
Page 28: ...Chapter 1 Introduction IAD User s Guide 28...
Page 39: ...39 PART II Technical Reference...
Page 40: ...40...
Page 50: ...Chapter 4 Status Screens IAD User s Guide 50...
Page 54: ...Chapter 5 Device Mode Screen IAD User s Guide 54...
Page 68: ...Chapter 7 LAN Setup IAD User s Guide 68...
Page 128: ...Chapter 10 Voice IAD User s Guide 128...
Page 158: ...Chapter 12 Firewalls IAD User s Guide 158...
Page 162: ...Chapter 13 Static Route IAD User s Guide 162...
Page 173: ...Chapter 14 Quality of Service QoS IAD User s Guide 173 Figure 81 QoS Class Example VoIP...
Page 174: ...Chapter 14 Quality of Service QoS IAD User s Guide 174 Figure 82 QoS Class Example Boss...
Page 182: ...Chapter 15 Dynamic DNS Setup IAD User s Guide 182...
Page 210: ...Chapter 17 Universal Plug and Play UPnP IAD User s Guide 210...
Page 214: ...Chapter 18 System IAD User s Guide 214...
Page 218: ...Chapter 19 Logs IAD User s Guide 218...
Page 224: ...Chapter 21 Diagnostic IAD User s Guide 224...
Page 230: ...Chapter 22 Troubleshooting IAD User s Guide 230...
Page 238: ...Chapter 23 Product Specifications IAD User s Guide 238...