Chapter 8 Wireless LAN
P-660N-T1A User’s Guide
121
For example, if the wireless network has a RADIUS server, you can choose
WPA
or
WPA2
. If users do not log in to the wireless network, you can choose no
encryption,
Static WEP
,
WPA-PSK
, or
WPA2-PSK
.
Usually, you should set up the strongest encryption that every device in the
wireless network supports. For example, suppose you have a wireless network
with the ZyXEL Device and you do not have a RADIUS server. Therefore, there is
no authentication. Suppose the wireless network has two devices. Device A only
supports WEP, and device B supports WEP and WPA. Therefore, you should set up
Static WEP
in the wireless network.
Note: It is recommended that wireless networks use
WPA-PSK
,
WPA
, or stronger
encryption. The other types of encryption are better than none at all, but it is still
possible for unauthorized wireless devices to figure out the original information
pretty quickly.
When you select
WPA2
or
WPA2-PSK
in your ZyXEL Device, you can also select
an option (
WPA compatible
) to support WPA as well. In this case, if some of the
devices support WPA and some support WPA2, you should set up
WPA2-PSK
or
WPA2
(depending on the type of wireless network login) and select the
WPA
compatible
option in the ZyXEL Device.
Many types of encryption use a key to protect the information in the wireless
network. The longer the key, the stronger the encryption. Every device in the
wireless network must have the same key.
8.8.4 Signal Problems
Because wireless networks are radio networks, their signals are subject to
limitations of distance, interference and absorption.
Problems with distance occur when the two radios are too far apart. Problems with
interference occur when other radio waves interrupt the data signal. Interference
may come from other radio transmissions, such as military or air traffic control
communications, or from machines that are coincidental emitters such as electric
motors or microwaves. Problems with absorption occur when physical objects
(such as thick walls) are between the two radios, muffling the signal.
8.8.5 BSS
A Basic Service Set (BSS) exists when all communications between wireless
stations or between a wireless station and a wired network client go through one
access point (AP).
Intra-BSS traffic is traffic between wireless stations in the BSS. When Intra-BSS
traffic blocking is disabled, wireless station A and B can access the wired network
Summary of Contents for P-660N-T1A
Page 2: ......
Page 8: ...Safety Warnings P 660N T1A User s Guide 8...
Page 10: ...Contents Overview P 660N T1A User s Guide 10...
Page 18: ...Table of Contents P 660N T1A User s Guide 18...
Page 19: ...19 PART I User s Guide...
Page 20: ...20...
Page 50: ...Chapter 4 Tutorials P 660N T1A User s Guide 50...
Page 51: ...51 PART II Technical Reference...
Page 52: ...52...
Page 84: ...Chapter 6 WAN Setup P 660N T1A User s Guide 84...
Page 98: ...Chapter 7 LAN Setup P 660N T1A User s Guide 98...
Page 146: ...Chapter 9 Network Address Translation NAT P 660N T1A User s Guide 146...
Page 150: ...Chapter 10 Firewall P 660N T1A User s Guide 150...
Page 160: ...Chapter 12 Static Route P 660N T1A User s Guide 160...
Page 200: ...Chapter 18 CWMP P 660HN T1A User s Guide 200...
Page 222: ...Chapter 21 Tools P 660N T1A User s Guide 222...
Page 232: ...Chapter 23 Troubleshooting P 660N T1A User s Guide 232...
Page 240: ...Chapter 24 Product Specifications P 660N T1A User s Guide 240...
Page 278: ...Appendix B IP Addresses and Subnetting P 660N T1A User s Guide 278...
Page 288: ...Appendix C Pop up Windows JavaScripts and Java Permissions P 660N T1A User s Guide 288...
Page 320: ...Index P 660N T1A User s Guide 320...
Page 321: ...Index P 660N T1A User s Guide 321...
Page 322: ...Index P 660N T1A User s Guide 322...