
VMG8825-B Series User’s Guide
96
C
HAPTER
7
Wireless
7.1 Overview
This chapter describes the VMG’s
Network Setting > Wireless
screens. Use these screens to set up your
VMG’s wireless connection.
7.1.1 What You Can Do in this Chapter
This section describes the VMG’s
Wireless
screens. Use these screens to set up your VMG’s wireless
connection.
• Use the
General
screen to enable the Wireless LAN, enter the SSID and select the wireless security
mode (
).
• Use the
Guest/More AP
screen to set up multiple wireless networks on your VMG (
).
• Use the
MAC Authentication
screen to allow or deny wireless clients based on their MAC addresses
from connecting to the VMG (
).
• Use the
WPS
screen to enable or disable WPS, view or generate a security PIN (Personal Identification
• Use the
WMM
screen
to enable Wi-Fi MultiMedia (WMM) to ensure quality of service in wireless
networks for multimedia applications (
• Use the
Others
screen to configure wireless advanced features, such as the RTS/CTS Threshold
(
).
• Use the
Channel Status
screen to scan wireless LAN channel noises and view the results (
• Use the
MESH
screen to enable or disable Zyxel Mesh (Multy Pro)(
).
• Use the
WLAN Scheduler
screen to set up schedule for the VMG’s multiple wireless networks (
Section
7.10 on page 111
).
7.1.2 What You Need to Know
Wireless Basics
“Wireless” is essentially radio communication. In the same way that walkie-talkie radios send and
receive information over the airwaves, wireless networking devices exchange information with one
another. A wireless networking device is just like a radio that lets your computer exchange information
with radios attached to other computers. Like walkie-talkies, most wireless networking devices operate
at radio frequency bands that are open to the public and do not require a license to use. However,
wireless networking is different from that of most traditional radio communications in that there a
number of wireless networking standards available with different methods of data encryption.