P-660HW-T v2 User’s Guide
326
Appendix K Wireless LANs
Wireless Security Overview
Wireless security is vital to your network to protect wireless communication between wireless
clients, access points and the wired network.
Wireless security methods available on the ZyXEL Device are data encryption, wireless client
authentication, restricting access by device MAC address and hiding the ZyXEL Device
identity.
The following figure shows the relative effectiveness of these wireless security methods
available on your ZyXEL Device.
Note:
You must enable the same wireless security settings on the ZyXEL Device and
on all wireless clients that you want to associate with it.
RADIUS
RADIUS is based on a client-server model that supports authentication, authorization and
accounting. The access point is the client and the server is the RADIUS server. The RADIUS
server handles the following tasks:
• Authentication
Determines the identity of the users.
• Authorization
Determines the network services available to authenticated users once they are connected
to the network.
• Accounting
Keeps track of the client’s network activity.
RADIUS is a simple package exchange in which your AP acts as a message relay between the
wireless client and the network RADIUS server.
Table 147
Wireless Security Levels
Security Level
Security Type
Least Secure
Most Secure
Unique SSID (Default)
Unique SSID with Hide SSID Enabled
MAC Address Filtering
WEP Encryption
IEEE802.1x EAP with RADIUS Server Authentication
Wi-Fi Protected Access (WPA)
WPA2
Содержание P-660HW-T - V2
Страница 1: ...P 660HW T v2 802 11g Wireless ADSL 2 4 port Gateway User s Guide Version 3 40 Edition 1 12 2006...
Страница 2: ......
Страница 7: ...P 660HW T v2 User s Guide Safety Warnings 7 This product is recyclable Dispose of it properly...
Страница 26: ...P 660HW T v2 User s Guide 26 List of Figures...
Страница 40: ...P 660HW T v2 User s Guide 40 Chapter 1 Getting To Know Your ZyXEL Device...
Страница 53: ...P 660HW T v2 User s Guide Chapter 2 Introducing the Web Configurator 53 Figure 13 System General...
Страница 54: ...P 660HW T v2 User s Guide 54 Chapter 2 Introducing the Web Configurator...
Страница 74: ...P 660HW T v2 User s Guide 74 Chapter 4 Bandwidth Management Wizard...
Страница 92: ...P 660HW T v2 User s Guide 92 Chapter 5 WAN Setup...
Страница 124: ...P 660HW T v2 User s Guide 124 Chapter 7 LAN Setup...
Страница 156: ...P 660HW T v2 User s Guide 156 Chapter 10 Firewall Configuration Figure 85 Firewall Edit Rule...
Страница 170: ...P 660HW T v2 User s Guide 170 Chapter 10 Firewall Configuration...
Страница 174: ...P 660HW T v2 User s Guide 174 Chapter 11 Content Filtering...
Страница 178: ...P 660HW T v2 User s Guide 178 Chapter 12 Static Route...
Страница 190: ...P 660HW T v2 User s Guide 190 Chapter 13 Bandwidth Management...
Страница 194: ...P 660HW T v2 User s Guide 194 Chapter 14 Dynamic DNS Setup...
Страница 206: ...P 660HW T v2 User s Guide 206 Chapter 15 Remote Management Configuration...
Страница 218: ...P 660HW T v2 User s Guide 218 Chapter 16 Universal Plug and Play UPnP...
Страница 224: ...P 660HW T v2 User s Guide 224 Chapter 17 System...
Страница 244: ...P 660HW T v2 User s Guide 244 Chapter 18 Logs...
Страница 250: ...P 660HW T v2 User s Guide 250 Chapter 19 Tools...
Страница 256: ...P 660HW T v2 User s Guide 256 Chapter 21 Troubleshooting...
Страница 260: ...P 660HW T v2 User s Guide 260 Appendix A Product Specifications...
Страница 280: ...P 660HW T v2 User s Guide 280 Appendix D Wall mounting Instructions...
Страница 308: ...P 660HW T v2 User s Guide 308 Appendix G Command Interpreter...
Страница 320: ...P 660HW T v2 User s Guide 320 Appendix J Splitters and Microfilters...
Страница 334: ...P 660HW T v2 User s Guide 334 Appendix K Wireless LANs...
Страница 342: ...P 660HW T v2 User s Guide 342 Appendix L Pop up Windows JavaScripts and Java Permissions Figure 195 Java Sun...