Chapter 8 Wireless LAN
P-660HN-TxA User’s Guide
124
You can use the MAC address filter to tell the ZyXEL Device which devices are
allowed or not allowed to use the wireless network. If a device is allowed to use
the wireless network, it still has to have the correct information (SSID, channel,
and security). If a device is not allowed to use the wireless network, it does not
matter if it has the correct information.
This type of security does not protect the information that is sent in the wireless
network. Furthermore, there are ways for unauthorized wireless devices to get the
MAC address of an authorized device. Then, they can use that MAC address to use
the wireless network.
8.8.3.3 User Authentication
Authentication is the process of verifying whether a wireless device is allowed to
use the wireless network. You can make every user log in to the wireless network
before using it. However, every device in the wireless network has to support IEEE
802.1x to do this.
For wireless networks, you can store the user names and passwords for each user
in a RADIUS server. This is a server used in businesses more than in homes. If you
do not have a RADIUS server, you cannot set up user names and passwords for
your users.
Unauthorized wireless devices can still see the information that is sent in the
wireless network, even if they cannot use the wireless network. Furthermore,
there are ways for unauthorized wireless users to get a valid user name and
password. Then, they can use that user name and password to use the wireless
network.
8.8.3.4 Encryption
Wireless networks can use encryption to protect the information that is sent in the
wireless network. Encryption is like a secret code. If you do not know the secret
code, you cannot understand the message.
The types of encryption you can choose depend on the type of authentication.
(See
for information about this.)
Table 40
Types of Encryption for Each Type of Authentication
NO AUTHENTICATION RADIUS SERVER
Weakest
No Security
WPA
Static WEP
WPA-PSK
Strongest
WPA2-PSK
WPA2
Содержание P-660HN-TxA
Страница 2: ......
Страница 8: ...Safety Warnings P 660HN TxA User s Guide 8...
Страница 10: ...Contents Overview P 660HN TxA User s Guide 10...
Страница 18: ...Table of Contents P 660HN TxA User s Guide 18...
Страница 19: ...19 PART I User s Guide...
Страница 20: ...20...
Страница 28: ...Chapter 1 Introduction P 660HN TxA User s Guide 28...
Страница 57: ...57 PART II Technical Reference...
Страница 58: ...58...
Страница 102: ...Chapter 7 LAN Setup P 660HN TxA User s Guide 102...
Страница 150: ...Chapter 9 Network Address Translation NAT P 660HN TxA User s Guide 150...
Страница 154: ...Chapter 10 Firewall P 660HN TxA User s Guide 154...
Страница 164: ...Chapter 12 Static Route P 660HN TxA User s Guide 164...
Страница 190: ...Chapter 16 Remote Management P 660HN TxA User s Guide 190...
Страница 206: ...Chapter 18 CWMP P 660HN TxA User s Guide 206...
Страница 228: ...Chapter 21 Tools P 660HN TxA User s Guide 228...
Страница 238: ...Chapter 23 Troubleshooting P 660HN TxA User s Guide 238...
Страница 270: ...Appendix A Setting up Your Computer s IP Address P 660HN TxA User s Guide 270...
Страница 280: ...Appendix B IP Addresses and Subnetting P 660HN TxA User s Guide 280...
Страница 290: ...Appendix C Pop up Windows JavaScripts and Java Permissions P 660HN TxA User s Guide 290...
Страница 322: ...Index P 660HN TxA User s Guide 322...
Страница 323: ...Index P 660HN TxA User s Guide 323...
Страница 324: ...Index P 660HN TxA User s Guide 324...