![ZyXEL Communications CellPipe 7130 RG Скачать руководство пользователя страница 141](http://html1.mh-extra.com/html/zyxel-communications/cellpipe-7130-rg/cellpipe-7130-rg_user-manual_945990141.webp)
Chapter 7 Wireless LAN
CellPipe 7130 RG User’s Guide
141
network’s name. This helps you identify your wireless network when wireless
networks’ coverage areas overlap and you have a variety of networks to choose
from.
Radio Channels
In the radio spectrum, there are certain frequency bands allocated for unlicensed,
civilian use. For the purposes of wireless networking, these bands are divided into
numerous channels. This allows a variety of networks to exist in the same place
without interfering with one another. When you create a network, you must select
a channel to use.
Since the available unlicensed spectrum varies from one country to another, the
number of available channels also varies.
Wireless Security
By their nature, radio communications are simple to intercept. For wireless data
networks, this means that anyone within range of a wireless network without
security can not only read the data passing over the airwaves, but also join the
network. Once an unauthorized person has access to the network she/he can
either steal information or introduce malware (malicious software) intended to
compromise the network. For these reasons, a variety of security systems have
been developed to ensure that only authorized people can use a wireless data
network, or understand the data carried on it.
These security standards do two things. First, they authenticate. This means that
only people presenting the right credentials (often a username and password, or a
“key” phrase) can access the network. Second, they encrypt. This means that the
information sent over the air is encoded. Only people with the code key can
understand the information, and only people who have been authenticated are
given the code key.
These security standards vary in effectiveness. Some can be broken, such as the
old Wired Equivalent Protocol (WEP). Using WEP is better than using no security at
all, but it will not keep a determined attacker out. Other security standards are
secure in themselves but can be broken if a user does not use them properly. For
example, the WPA-PSK security standard is perfectly secure if you use a long key
which is difficult for an attacker’s software to guess - for example, a twenty-letter
long string of apparently random numbers and letters - but it is not very secure if
you use a short key which is very easy to guess.
Because of the damage that can be done by a malicious attacker, it’s not just
people who have sensitive information on their network who should use security.
Everybody who uses any wireless network should ensure that effective security is
in place.
Содержание CellPipe 7130 RG
Страница 2: ......
Страница 8: ...Contents Overview CellPipe 7130 RG User s Guide 8...
Страница 17: ...17 PART I User s Guide...
Страница 18: ...18...
Страница 89: ...89 PART II Technical Reference...
Страница 90: ...90...
Страница 100: ...Chapter 4 Status Screens CellPipe 7130 RG User s Guide 100...
Страница 138: ...Chapter 6 LAN Setup CellPipe 7130 RG User s Guide 138...
Страница 180: ...Chapter 8 Network Address Translation NAT CellPipe 7130 RG User s Guide 180...
Страница 186: ...Chapter 9 File Sharing CellPipe 7130 RG User s Guide 186...
Страница 190: ...Chapter 10 Media Server CellPipe 7130 RG User s Guide 190...
Страница 208: ...Chapter 12 Certificate CellPipe 7130 RG User s Guide 208...
Страница 212: ...Chapter 13 Static Route CellPipe 7130 RG User s Guide 212...
Страница 216: ...Chapter 14 Policy Forwarding CellPipe 7130 RG User s Guide 216...
Страница 236: ...Chapter 16 Quality of Service QoS CellPipe 7130 RG User s Guide 236...
Страница 256: ...Chapter 19 Universal Plug and Play UPnP CellPipe 7130 RG User s Guide 256...
Страница 274: ...Chapter 23 Logs CellPipe 7130 RG User s Guide 274...
Страница 282: ...Chapter 24 Tools CellPipe 7130 RG User s Guide 282...
Страница 303: ...Chapter 27 Product Specifications CellPipe 7130 RG User s Guide 303...
Страница 304: ...Chapter 27 Product Specifications CellPipe 7130 RG User s Guide 304...
Страница 320: ...Appendix A Network Troubleshooting CellPipe 7130 RG User s Guide 320...
Страница 360: ...Appendix C Pop up Windows JavaScripts and Java Permissions CellPipe 7130 RG User s Guide 360...
Страница 372: ...Appendix D IP Addresses and Subnetting CellPipe 7130 RG User s Guide 372...
Страница 397: ...Appendix G Legal Information CellPipe 7130 RG User s Guide 396...
Страница 404: ...Index CellPipe 7130 RG User s Guide 403...