![ZyXEL Communications P-3202HN-Ba User Manual Download Page 91](http://html1.mh-extra.com/html/zyxel-communications/p-3202hn-ba/p-3202hn-ba_user-manual_945952091.webp)
Chapter 8 Wireless LAN
IAD User’s Guide
91
8.10.2 Additional Wireless Terms
The following table describes some wireless network terms and acronyms used in
the IAD’s Web Configurator.
8.10.3 Wireless Security Overview
The following sections introduce different types of wireless security you can set up
in the wireless network.
8.10.3.1 SSID
Normally, the IAD acts like a beacon and regularly broadcasts the SSID in the
area. You can hide the SSID instead, in which case the IAD does not broadcast the
SSID. In addition, you should change the default SSID to something that is
difficult to guess.
This type of security is fairly weak, however, because there are ways for
unauthorized wireless devices to get the SSID. In addition, unauthorized wireless
devices can still see the information that is sent in the wireless network.
8.10.3.2 MAC Address Filter
Every device that can use a wireless network has a unique identification number,
called a MAC address.
1
A MAC address is usually written using twelve hexadecimal
Table 24
Additional Wireless Terms
TERM
DESCRIPTION
RTS/CTS Threshold
In a wireless network which covers a large area, wireless devices
are sometimes not aware of each other’s presence. This may cause
them to send information to the AP at the same time and result in
information colliding and not getting through.
By setting this value lower than the default value, the wireless
devices must sometimes get permission to send information to the
IAD. The lower the value, the more often the devices must get
permission.
If this value is greater than the fragmentation threshold value (see
below), then wireless devices never have to get permission to send
information to the IAD.
Preamble
A preamble affects the timing in your wireless network. There are
two preamble modes: long and short.
If a device uses a different
preamble mode than the IAD does, it cannot communicate with the
IAD.
Authentication
The process of verifying whether a wireless device is allowed to use
the wireless network.
Fragmentation
Threshold
A small fragmentation threshold is recommended for busy networks,
while a larger threshold provides faster performance if the network
is not very busy.
Summary of Contents for P-3202HN-Ba
Page 2: ......
Page 8: ...Safety Warnings IAD User s Guide 8...
Page 10: ...Contents Overview IAD User s Guide 10...
Page 18: ...Table of Contents IAD User s Guide 18...
Page 19: ...19 PART I User s Guide...
Page 20: ...20...
Page 28: ...Chapter 1 Introduction IAD User s Guide 28...
Page 39: ...39 PART II Technical Reference...
Page 40: ...40...
Page 50: ...Chapter 4 Status Screens IAD User s Guide 50...
Page 54: ...Chapter 5 Device Mode Screen IAD User s Guide 54...
Page 68: ...Chapter 7 LAN Setup IAD User s Guide 68...
Page 128: ...Chapter 10 Voice IAD User s Guide 128...
Page 158: ...Chapter 12 Firewalls IAD User s Guide 158...
Page 162: ...Chapter 13 Static Route IAD User s Guide 162...
Page 173: ...Chapter 14 Quality of Service QoS IAD User s Guide 173 Figure 81 QoS Class Example VoIP...
Page 174: ...Chapter 14 Quality of Service QoS IAD User s Guide 174 Figure 82 QoS Class Example Boss...
Page 182: ...Chapter 15 Dynamic DNS Setup IAD User s Guide 182...
Page 210: ...Chapter 17 Universal Plug and Play UPnP IAD User s Guide 210...
Page 214: ...Chapter 18 System IAD User s Guide 214...
Page 218: ...Chapter 19 Logs IAD User s Guide 218...
Page 224: ...Chapter 21 Diagnostic IAD User s Guide 224...
Page 230: ...Chapter 22 Troubleshooting IAD User s Guide 230...
Page 238: ...Chapter 23 Product Specifications IAD User s Guide 238...