Chapter 10 Wireless LAN
NBG6818 User’s Guide
103
• Use the
WPS
screen to quickly set up a wireless network with strong security without having to
configure security settings manually (
).
• Use the
Scheduling
screen to set the times your wireless LAN is turned on and off (
10.1.2 What You Should Know
Every wireless network must follow these basic guidelines.
• Every wireless client in the same wireless network must use the same Service Set Identifier (SSID).
The SSID is the name of the wireless network.
• If two wireless networks overlap, they should use different channels.
Like radio stations or television channels, each wireless network uses a specific channel, or frequency,
to send and receive information.
• Every wireless client in the same wireless network must use security compatible with the AP.
Security stops unauthorized devices from using the wireless network. It also protects information that is
sent through the wireless network.
Wireless Security Overview
The following sections introduce different types of wireless security you can set up in the wireless
network.
SSID
Normally, the AP acts like a beacon and regularly broadcasts the SSID in the area. You can hide the
SSID instead, in which case the AP does not broadcast the SSID. In addition, you should change the
default SSID to something that is difficult to guess.
This type of security is fairly weak, however, because there are ways for unauthorized devices to get the
SSID. In addition, unauthorized devices can still see the information that is sent in the wireless network.
MAC Address Filter
Every wireless client has a unique identification number, called a MAC address.
1
A MAC address is
usually written using twelve hexadecimal characters
2
; for example, 00A0C5000002 or 00:A0:C5:00:00:02.
To get the MAC address for each wireless client, see the appropriate User’s Guide or other
documentation.
You can use the MAC address filter to tell the AP which wireless clients are allowed or not allowed to use
the wireless network. If a wireless client is allowed to use the wireless network, it still has to have the
correct settings (SSID, channel, and security). If a wireless client is not allowed to use the wireless
network, it does not matter if it has the correct settings.
This type of security does not protect the information that is sent in the wireless network. Furthermore,
there are ways for unauthorized devices to get the MAC address of an authorized wireless client. Then,
they can use that MAC address to use the wireless network.
1.
Some wireless devices, such as scanners, can detect wireless networks but cannot use wireless networks. These
kinds of wireless devices might not have MAC addresses.
2.
Hexadecimal characters are 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, and F.
Содержание ARMOR G1
Страница 9: ...Table of Contents NBG6818 User s Guide 9 Appendix D Legal Information 175 Index 181...
Страница 10: ...10 PART I User s Guide...
Страница 20: ...Chapter 2 Wizard NBG6818 User s Guide 20 4 Wait a moment for your WiFi settings to be applied to your NBG6818...
Страница 54: ...Chapter 7 Tutorials NBG6818 User s Guide 54...
Страница 55: ...55 PART II Technical Reference...
Страница 76: ...Chapter 8 Applications NBG6818 User s Guide 76 5 Once you log in the USB device displays in the usb1 folder...
Страница 100: ...Chapter 9 WAN NBG6818 User s Guide 100 2 Click Network and Sharing Center 3 Click Change advanced sharing settings...
Страница 115: ...Chapter 11 LAN NBG6818 User s Guide 115 Figure 66 Settings LAN LAN IP Standard Mode...
Страница 131: ...Chapter 13 System NBG6818 User s Guide 131 Figure 77 Settings System Status Standard Mode...