![ZyXEL Communications wap3205 V3 User Manual Download Page 55](http://html1.mh-extra.com/html/zyxel-communications/wap3205-v3/wap3205-v3_user-manual_945970055.webp)
Chapter 6 Wireless LAN
WAP3205 v3 User’s Guide
55
• If two wireless networks overlap, they should use different channels.
Like radio stations or television channels, each wireless network uses a specific channel, or frequency,
to send and receive information.
• Every wireless client in the same wireless network must use security compatible with the AP.
Security stops unauthorized devices from using the wireless network. It can also protect the
information that is sent in the wireless network.
6.3.1 Wireless Security Overview
The following sections introduce different types of wireless security you can set up in the wireless
network.
6.3.2 MAC Address Filter
Every wireless client has a unique identification number, called a MAC address.
1
A MAC address is
usually written using twelve hexadecimal characters
2
; for example, 00A0C5000002 or 00:A0:C5:00:00:02.
To get the MAC address for each wireless client, see the appropriate User’s Guide or other
documentation.
You can use the MAC address filter to tell the AP which wireless clients are allowed or not allowed to use
the wireless network. If a wireless client is allowed to use the wireless network, it still has to have the
correct settings (SSID, channel, and security). If a wireless client is not allowed to use the wireless
network, it does not matter if it has the correct settings.
This type of security does not protect the information that is sent in the wireless network. Furthermore,
there are ways for unauthorized devices to get the MAC address of an authorized wireless client. Then,
they can use that MAC address to use the wireless network.
6.3.3 Encryption
Wireless networks can use encryption to protect the information that is sent in the wireless network.
Encryption is like a secret code. If you do not know the secret code, you cannot understand the
message.
For example, if users do not log in to the wireless network, you can choose no encryption, WEP, WPA-PSK,
or WPA2-PSK.
1.
Some wireless devices, such as scanners, can detect wireless networks but cannot use wireless networks. These
kinds of wireless devices might not have MAC addresses.
2.
Hexadecimal characters are 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, and F.
Table 18 Types of Encryption for Each Type of Authentication
NO AUTHENTICATION
Weakest
No Security
Static WEP
WPA-PSK
Strongest
WPA2-PSK
Summary of Contents for wap3205 V3
Page 8: ...8 PART I User s Guide ...
Page 13: ...Chapter 1 Introduction WAP3205 v3 User s Guide 13 Figure 3 Wall Mounting Example ...
Page 52: ...52 PART II Technical Reference ...
Page 159: ...Appendix G Legal Information VMG3925 B10A User s Guide 159 Environmental Product Declaration ...
Page 164: ...Index WAP3205 v3 User s Guide 164 ...
Page 165: ...Index WAP3205 v3 User s Guide 165 ...