Chapter 8 Wireless LAN
IAD User’s Guide
91
8.10.2 Additional Wireless Terms
The following table describes some wireless network terms and acronyms used in
the IAD’s Web Configurator.
8.10.3 Wireless Security Overview
The following sections introduce different types of wireless security you can set up
in the wireless network.
8.10.3.1 SSID
Normally, the IAD acts like a beacon and regularly broadcasts the SSID in the
area. You can hide the SSID instead, in which case the IAD does not broadcast the
SSID. In addition, you should change the default SSID to something that is
difficult to guess.
This type of security is fairly weak, however, because there are ways for
unauthorized wireless devices to get the SSID. In addition, unauthorized wireless
devices can still see the information that is sent in the wireless network.
8.10.3.2 MAC Address Filter
Every device that can use a wireless network has a unique identification number,
called a MAC address.
1
A MAC address is usually written using twelve hexadecimal
Table 24
Additional Wireless Terms
TERM
DESCRIPTION
RTS/CTS Threshold
In a wireless network which covers a large area, wireless devices
are sometimes not aware of each other’s presence. This may cause
them to send information to the AP at the same time and result in
information colliding and not getting through.
By setting this value lower than the default value, the wireless
devices must sometimes get permission to send information to the
IAD. The lower the value, the more often the devices must get
permission.
If this value is greater than the fragmentation threshold value (see
below), then wireless devices never have to get permission to send
information to the IAD.
Preamble
A preamble affects the timing in your wireless network. There are
two preamble modes: long and short.
If a device uses a different
preamble mode than the IAD does, it cannot communicate with the
IAD.
Authentication
The process of verifying whether a wireless device is allowed to use
the wireless network.
Fragmentation
Threshold
A small fragmentation threshold is recommended for busy networks,
while a larger threshold provides faster performance if the network
is not very busy.
Содержание P-3202HN-Ba
Страница 2: ......
Страница 8: ...Safety Warnings IAD User s Guide 8...
Страница 10: ...Contents Overview IAD User s Guide 10...
Страница 18: ...Table of Contents IAD User s Guide 18...
Страница 19: ...19 PART I User s Guide...
Страница 20: ...20...
Страница 28: ...Chapter 1 Introduction IAD User s Guide 28...
Страница 39: ...39 PART II Technical Reference...
Страница 40: ...40...
Страница 50: ...Chapter 4 Status Screens IAD User s Guide 50...
Страница 54: ...Chapter 5 Device Mode Screen IAD User s Guide 54...
Страница 68: ...Chapter 7 LAN Setup IAD User s Guide 68...
Страница 128: ...Chapter 10 Voice IAD User s Guide 128...
Страница 158: ...Chapter 12 Firewalls IAD User s Guide 158...
Страница 162: ...Chapter 13 Static Route IAD User s Guide 162...
Страница 173: ...Chapter 14 Quality of Service QoS IAD User s Guide 173 Figure 81 QoS Class Example VoIP...
Страница 174: ...Chapter 14 Quality of Service QoS IAD User s Guide 174 Figure 82 QoS Class Example Boss...
Страница 182: ...Chapter 15 Dynamic DNS Setup IAD User s Guide 182...
Страница 210: ...Chapter 17 Universal Plug and Play UPnP IAD User s Guide 210...
Страница 214: ...Chapter 18 System IAD User s Guide 214...
Страница 218: ...Chapter 19 Logs IAD User s Guide 218...
Страница 224: ...Chapter 21 Diagnostic IAD User s Guide 224...
Страница 230: ...Chapter 22 Troubleshooting IAD User s Guide 230...
Страница 238: ...Chapter 23 Product Specifications IAD User s Guide 238...