![ZyXEL Communications P-660HN-F1A Скачать руководство пользователя страница 162](http://html1.mh-extra.com/html/zyxel-communications/p-660hn-f1a/p-660hn-f1a_user-manual_944065162.webp)
Chapter 8 Wireless LAN
P-660HN-F1A User’s Guide
162
These security standards do two things. First, they authenticate. This means that
only people presenting the right credentials (often a username and password, or a
“key” phrase) can access the network. Second, they encrypt. This means that the
information sent over the air is encoded. Only people with the code key can
understand the information, and only people who have been authenticated are
given the code key.
These security standards vary in effectiveness. Some can be broken, such as the
old Wired Equivalent Protocol (WEP). Using WEP is better than using no security at
all, but it will not keep a determined attacker out. Other security standards are
secure in themselves but can be broken if a user does not use them properly. For
example, the WPA-PSK security standard is very secure if you use a long key
which is difficult for an attacker’s software to guess - for example, a twenty-letter
long string of apparently random numbers and letters - but it is not very secure if
you use a short key which is very easy to guess - for example, a three-letter word
from the dictionary.
Because of the damage that can be done by a malicious attacker, it’s not just
people who have sensitive information on their network who should use security.
Everybody who uses any wireless network should ensure that effective security is
in place.
A good way to come up with effective security keys, passwords and so on is to use
obscure information that you personally will easily remember, and to enter it in a
way that appears random and does not include real words. For example, if your
mother owns a 1970 Dodge Challenger and her favorite movie is Vanishing Point
(which you know was made in 1971) you could use “70dodchal71vanpoi” as your
security key.
The following sections introduce different types of wireless security you can set up
in the wireless network.
8.7.3.1 SSID
Normally, the P-660HN-F1A acts like a beacon and regularly broadcasts the SSID
in the area. You can hide the SSID instead, in which case the P-660HN-F1A does
not broadcast the SSID. In addition, you should change the default SSID to
something that is difficult to guess.
This type of security is fairly weak, however, because there are ways for
unauthorized wireless devices to get the SSID. In addition, unauthorized wireless
devices can still see the information that is sent in the wireless network.
8.7.3.2 MAC Address Filter
Every device that can use a wireless network has a unique identification number,
called a MAC address.
1
A MAC address is usually written using twelve hexadecimal
Содержание P-660HN-F1A
Страница 2: ......
Страница 10: ...Contents Overview P 660HN F1A User s Guide 10...
Страница 20: ...Table of Contents P 660HN F1A User s Guide 20...
Страница 21: ...21 PART I User s Guide...
Страница 22: ...22...
Страница 36: ...Chapter 2 Introducing the Web Configurator P 660HN F1A User s Guide 36...
Страница 44: ...Chapter 3 Status Screens P 660HN F1A User s Guide 44...
Страница 77: ...Chapter 4 Tutorials P 660HN F1A User s Guide 77 2 Leave the other settings as their defaults and click Apply...
Страница 84: ...Chapter 4 Tutorials P 660HN F1A User s Guide 84 Physical Port 1 3 exclude port 4 3 Click Apply...
Страница 88: ...Chapter 4 Tutorials P 660HN F1A User s Guide 88...
Страница 103: ...103 PART II Technical Reference...
Страница 104: ...104...
Страница 142: ...Chapter 7 LAN Setup P 660HN F1A User s Guide 142...
Страница 188: ...Chapter 9 Network Address Translation NAT P 660HN F1A User s Guide 188...
Страница 210: ...Chapter 10 Firewalls P 660HN F1A User s Guide 210...
Страница 236: ...Chapter 13 Certificates P 660HN F1A User s Guide 236...
Страница 240: ...Chapter 14 Static Route P 660HN F1A User s Guide 240...
Страница 256: ...Chapter 16 Quality of Service QoS P 660HN F1A User s Guide 256 Figure 111 QoS Class Example Boss 2...
Страница 276: ...Chapter 17 Dynamic DNS Setup P 660HN F1A User s Guide 276...
Страница 288: ...Chapter 18 Remote Management P 660HN F1A User s Guide 288...
Страница 344: ...Chapter 24 Troubleshooting P 660HN F1A User s Guide 344...
Страница 376: ...Appendix A Setting up Your Computer s IP Address P 660HN F1A User s Guide 376...
Страница 386: ...Appendix B Pop up Windows JavaScripts and Java Permissions P 660HN F1A User s Guide 386...
Страница 396: ...Appendix C IP Addresses and Subnetting P 660HN F1A User s Guide 396...
Страница 420: ...Appendix F Legal Information P 660HN F1A User s Guide 420...
Страница 430: ...Index P 660HN F1A User s Guide 430...