Chapter 8 Wireless LAN
P-660N-T1A User’s Guide
119
These security standards vary in effectiveness. Some can be broken, such as the
old Wired Equivalent Protocol (WEP). Using WEP is better than using no security at
all, but it will not keep a determined attacker out. Other security standards are
secure in themselves but can be broken if a user does not use them properly. For
example, the WPA-PSK security standard is very secure if you use a long key
which is difficult for an attacker’s software to guess - for example, a twenty-letter
long string of apparently random numbers and letters - but it is not very secure if
you use a short key which is very easy to guess - for example, a three-letter word
from the dictionary.
Because of the damage that can be done by a malicious attacker, it’s not just
people who have sensitive information on their network who should use security.
Everybody who uses any wireless network should ensure that effective security is
in place.
A good way to come up with effective security keys, passwords and so on is to use
obscure information that you personally will easily remember, and to enter it in a
way that appears random and does not include real words. For example, if your
mother owns a 1970 Dodge Challenger and her favorite movie is Vanishing Point
(which you know was made in 1971) you could use “70dodchal71vanpoi” as your
security key.
The following sections introduce different types of wireless security you can set up
in the wireless network.
8.8.3.1 SSID
Normally, the ZyXEL Device acts like a beacon and regularly broadcasts the SSID
in the area. You can hide the SSID instead, in which case the ZyXEL Device does
not broadcast the SSID. In addition, you should change the default SSID to
something that is difficult to guess.
This type of security is fairly weak, however, because there are ways for
unauthorized wireless devices to get the SSID. In addition, unauthorized wireless
devices can still see the information that is sent in the wireless network.
8.8.3.2 MAC Address Filter
Every device that can use a wireless network has a unique identification number,
called a MAC address.
1
A MAC address is usually written using twelve hexadecimal
characters
2
; for example, 00A0C5000002 or 00:A0:C5:00:00:02. To get the MAC
address for each device in the wireless network, see the device’s User’s Guide or
other documentation.
1.
Some wireless devices, such as scanners, can detect wireless networks but cannot use wireless networks.
These kinds of wireless devices might not have MAC addresses.
2.
Hexadecimal characters are 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, and F.
Содержание P-660N-T1A
Страница 2: ......
Страница 8: ...Safety Warnings P 660N T1A User s Guide 8...
Страница 10: ...Contents Overview P 660N T1A User s Guide 10...
Страница 18: ...Table of Contents P 660N T1A User s Guide 18...
Страница 19: ...19 PART I User s Guide...
Страница 20: ...20...
Страница 50: ...Chapter 4 Tutorials P 660N T1A User s Guide 50...
Страница 51: ...51 PART II Technical Reference...
Страница 52: ...52...
Страница 84: ...Chapter 6 WAN Setup P 660N T1A User s Guide 84...
Страница 98: ...Chapter 7 LAN Setup P 660N T1A User s Guide 98...
Страница 146: ...Chapter 9 Network Address Translation NAT P 660N T1A User s Guide 146...
Страница 150: ...Chapter 10 Firewall P 660N T1A User s Guide 150...
Страница 160: ...Chapter 12 Static Route P 660N T1A User s Guide 160...
Страница 200: ...Chapter 18 CWMP P 660HN T1A User s Guide 200...
Страница 222: ...Chapter 21 Tools P 660N T1A User s Guide 222...
Страница 232: ...Chapter 23 Troubleshooting P 660N T1A User s Guide 232...
Страница 240: ...Chapter 24 Product Specifications P 660N T1A User s Guide 240...
Страница 278: ...Appendix B IP Addresses and Subnetting P 660N T1A User s Guide 278...
Страница 288: ...Appendix C Pop up Windows JavaScripts and Java Permissions P 660N T1A User s Guide 288...
Страница 320: ...Index P 660N T1A User s Guide 320...
Страница 321: ...Index P 660N T1A User s Guide 321...
Страница 322: ...Index P 660N T1A User s Guide 322...