
75
HITRON CGNV2 USER’S GUIDE
WIRELESS
6.1.3
BASIC WIRELESS SECURITY
Radio is inherently an insecure medium, since it can be intercepted by anybody in the
coverage area with a radio receiver. Therefore, a variety of techniques exist in an
attempt to secure it.
These techniques control authentication (identifying who should be allowed to join the
network) and encryption (signal scrambling so that only authenticated users can
decode the transmitted data). The sophistication of each security method varies, as
does its effectiveness.
The CGNV2 supports the following wireless security protocols (in order of
effectiveness):
For more information on these security protocols, see
.
6.2
WIRELESS TUTORIALS
This section walks you through some of the more common wireless networking tasks.
NOTE:
For basic wireless network setup, please see the Quick Installation Guide that
came with your CGNV2.
These tasks include:
Changing the Wireless Password
Changing the Network Name (SSID)
Improving the Wireless Network’s Performance
6.2.1
CHOOSING A SECURITY METHOD
The security method that you choose to use for your wireless network depends upon
the security methods supported by the devices on the network (the CGNV2, your PC,
your laptop, and so on).
Not all devices support the same security methods, so you must find out what
security methods each of the supports, and choose a method that they all support.
Least secure
No security
WEP
WPA-PSK
Most secure
WPA2-PSK
Содержание CGNV2
Страница 2: ......
Страница 6: ...6 HITRON CGNV2 USER S GUIDE ABOUT THIS USER S GUIDE...
Страница 38: ...38 HITRON CGNV2 USER S GUIDE CABLE...
Страница 48: ...48 HITRON CGNV2 USER S GUIDE WAN LAN...
Страница 66: ...66 HITRON CGNV2 USER S GUIDE FIREWALL...
Страница 72: ...72 HITRON CGNV2 USER S GUIDE PARENTAL CONTROL...
Страница 96: ...96 HITRON CGNV2 USER S GUIDE EMTA...
Страница 108: ...10 HITRON CGNV2 USER S GUIDE VPN...
Страница 112: ...112 HITRON CGNV2 USER S GUIDE TROUBLESHOOTING...