![ZyXEL Communications P-660HN-F1A User Manual Download Page 163](http://html1.mh-extra.com/html/zyxel-communications/p-660hn-f1a/p-660hn-f1a_user-manual_944065163.webp)
Chapter 8 Wireless LAN
P-660HN-F1A User’s Guide
163
characters
2
; for example, 00A0C5000002 or 00:A0:C5:00:00:02. To get the MAC
address for each device in the wireless network, see the device’s User’s Guide or
other documentation.
You can use the MAC address filter to tell the P-660HN-F1A which devices are
allowed or not allowed to use the wireless network. If a device is allowed to use
the wireless network, it still has to have the correct information (SSID, channel,
and security). If a device is not allowed to use the wireless network, it does not
matter if it has the correct information.
This type of security does not protect the information that is sent in the wireless
network. Furthermore, there are ways for unauthorized wireless devices to get the
MAC address of an authorized device. Then, they can use that MAC address to use
the wireless network.
8.7.3.3 User Authentication
Authentication is the process of verifying whether a wireless device is allowed to
use the wireless network. You can make every user log in to the wireless network
before using it. However, every device in the wireless network has to support IEEE
802.1x to do this.
For wireless networks, you can store the user names and passwords for each user
in a RADIUS server. This is a server used in businesses more than in homes. If you
do not have a RADIUS server, you cannot set up user names and passwords for
your users.
Unauthorized wireless devices can still see the information that is sent in the
wireless network, even if they cannot use the wireless network. Furthermore,
there are ways for unauthorized wireless users to get a valid user name and
password. Then, they can use that user name and password to use the wireless
network.
8.7.3.4 Encryption
Wireless networks can use encryption to protect the information that is sent in the
wireless network. Encryption is like a secret code. If you do not know the secret
code, you cannot understand the message.
1.
Some wireless devices, such as scanners, can detect wireless networks but cannot use wireless networks.
These kinds of wireless devices might not have MAC addresses.
2.
Hexadecimal characters are 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, and F.
Summary of Contents for P-660HN-F1A
Page 2: ......
Page 10: ...Contents Overview P 660HN F1A User s Guide 10...
Page 20: ...Table of Contents P 660HN F1A User s Guide 20...
Page 21: ...21 PART I User s Guide...
Page 22: ...22...
Page 36: ...Chapter 2 Introducing the Web Configurator P 660HN F1A User s Guide 36...
Page 44: ...Chapter 3 Status Screens P 660HN F1A User s Guide 44...
Page 84: ...Chapter 4 Tutorials P 660HN F1A User s Guide 84 Physical Port 1 3 exclude port 4 3 Click Apply...
Page 88: ...Chapter 4 Tutorials P 660HN F1A User s Guide 88...
Page 103: ...103 PART II Technical Reference...
Page 104: ...104...
Page 142: ...Chapter 7 LAN Setup P 660HN F1A User s Guide 142...
Page 188: ...Chapter 9 Network Address Translation NAT P 660HN F1A User s Guide 188...
Page 210: ...Chapter 10 Firewalls P 660HN F1A User s Guide 210...
Page 236: ...Chapter 13 Certificates P 660HN F1A User s Guide 236...
Page 240: ...Chapter 14 Static Route P 660HN F1A User s Guide 240...
Page 276: ...Chapter 17 Dynamic DNS Setup P 660HN F1A User s Guide 276...
Page 288: ...Chapter 18 Remote Management P 660HN F1A User s Guide 288...
Page 344: ...Chapter 24 Troubleshooting P 660HN F1A User s Guide 344...
Page 376: ...Appendix A Setting up Your Computer s IP Address P 660HN F1A User s Guide 376...
Page 386: ...Appendix B Pop up Windows JavaScripts and Java Permissions P 660HN F1A User s Guide 386...
Page 396: ...Appendix C IP Addresses and Subnetting P 660HN F1A User s Guide 396...
Page 420: ...Appendix F Legal Information P 660HN F1A User s Guide 420...
Page 430: ...Index P 660HN F1A User s Guide 430...