Chapter 8 Wireless LAN
P-660N-T1A User’s Guide
120
You can use the MAC address filter to tell the ZyXEL Device which devices are
allowed or not allowed to use the wireless network. If a device is allowed to use
the wireless network, it still has to have the correct information (SSID, channel,
and security). If a device is not allowed to use the wireless network, it does not
matter if it has the correct information.
This type of security does not protect the information that is sent in the wireless
network. Furthermore, there are ways for unauthorized wireless devices to get the
MAC address of an authorized device. Then, they can use that MAC address to use
the wireless network.
8.8.3.3 User Authentication
Authentication is the process of verifying whether a wireless device is allowed to
use the wireless network. You can make every user log in to the wireless network
before using it. However, every device in the wireless network has to support IEEE
802.1x to do this.
For wireless networks, you can store the user names and passwords for each user
in a RADIUS server. This is a server used in businesses more than in homes. If you
do not have a RADIUS server, you cannot set up user names and passwords for
your users.
Unauthorized wireless devices can still see the information that is sent in the
wireless network, even if they cannot use the wireless network. Furthermore,
there are ways for unauthorized wireless users to get a valid user name and
password. Then, they can use that user name and password to use the wireless
network.
8.8.3.4 Encryption
Wireless networks can use encryption to protect the information that is sent in the
wireless network. Encryption is like a secret code. If you do not know the secret
code, you cannot understand the message.
The types of encryption you can choose depend on the type of authentication.
(See
for information about this.)
Table 38
Types of Encryption for Each Type of Authentication
NO AUTHENTICATION RADIUS SERVER
Weakest
No Security
WPA
Static WEP
WPA-PSK
Strongest
WPA2-PSK
WPA2
Summary of Contents for P-660N-T1A
Page 2: ......
Page 8: ...Safety Warnings P 660N T1A User s Guide 8...
Page 10: ...Contents Overview P 660N T1A User s Guide 10...
Page 18: ...Table of Contents P 660N T1A User s Guide 18...
Page 19: ...19 PART I User s Guide...
Page 20: ...20...
Page 50: ...Chapter 4 Tutorials P 660N T1A User s Guide 50...
Page 51: ...51 PART II Technical Reference...
Page 52: ...52...
Page 84: ...Chapter 6 WAN Setup P 660N T1A User s Guide 84...
Page 98: ...Chapter 7 LAN Setup P 660N T1A User s Guide 98...
Page 146: ...Chapter 9 Network Address Translation NAT P 660N T1A User s Guide 146...
Page 150: ...Chapter 10 Firewall P 660N T1A User s Guide 150...
Page 160: ...Chapter 12 Static Route P 660N T1A User s Guide 160...
Page 200: ...Chapter 18 CWMP P 660HN T1A User s Guide 200...
Page 222: ...Chapter 21 Tools P 660N T1A User s Guide 222...
Page 232: ...Chapter 23 Troubleshooting P 660N T1A User s Guide 232...
Page 240: ...Chapter 24 Product Specifications P 660N T1A User s Guide 240...
Page 278: ...Appendix B IP Addresses and Subnetting P 660N T1A User s Guide 278...
Page 288: ...Appendix C Pop up Windows JavaScripts and Java Permissions P 660N T1A User s Guide 288...
Page 320: ...Index P 660N T1A User s Guide 320...
Page 321: ...Index P 660N T1A User s Guide 321...
Page 322: ...Index P 660N T1A User s Guide 322...