Chapter 6 Wireless LAN
P-660W-Tx v2 User’s Guide
77
The SSID is the name of the wireless network. It stands for Service Set IDentifier.
• If two wireless networks overlap, they should use different channels.
Like radio stations or television channels, each wireless network uses a specific channel,
or frequency, to send and receive information.
• Every wireless client in the same wireless network must use security compatible with the
AP.
Security stops unauthorized devices from using the wireless network. It can also protect
the information that is sent in the wireless network.
Radio Channels
In the radio spectrum, there are certain frequency bands allocated for unlicensed, civilian use.
For the purposes of wireless networking, these bands are divided into numerous channels. This
allows a variety of networks to exist in the same place without interfering with one another.
When you create a network, you must select a channel to use.
Since the available unlicensed spectrum varies from one country to another, the number of
available channels also varies.
6.6.2 Wireless Security Overview
By their nature, radio communications are simple to intercept. For wireless data networks, this
means that anyone within range of a wireless network without security can not only read the
data passing over the airwaves, but also join the network. Once an unauthorized person has
access to the network he or she can steal information or introduce malware (malicious
software) intended to compromise the network. For these reasons, a variety of security
systems have been developed to ensure that only authorized people can use a wireless data
network, or understand the data carried on it.
These security standards do two things. First, they authenticate. This means that only people
presenting the right credentials (often a username and password, or a “key” phrase) can access
the network. Second, they encrypt. This means that the information sent over the air is
encoded. Only people with the code key can understand the information, and only people who
have been authenticated are given the code key.
These security standards vary in effectiveness. Some can be broken, such as the old Wired
Equivalent Protocol (WEP). Using WEP is better than using no security at all, but it will not
keep a determined attacker out. Other security standards are secure in themselves but can be
broken if a user does not use them properly. For example, the WPA-PSK security standard is
very secure if you use a long key which is difficult for an attacker’s software to guess - for
example, a twenty-letter long string of apparently random numbers and letters - but it is not
very secure if you use a short key which is very easy to guess - for example, a three-letter word
from the dictionary.
Because of the damage that can be done by a malicious attacker, it’s not just people who have
sensitive information on their network who should use security. Everybody who uses any
wireless network should ensure that effective security is in place.
Содержание P-660W-T1 v2
Страница 2: ......
Страница 8: ...Safety Warnings P 660W Tx v2 User s Guide 8 ...
Страница 10: ...Contents Overview P 660W Tx v2 User s Guide 10 ...
Страница 18: ...Table of Contents P 660W Tx v2 User s Guide 18 ...
Страница 22: ...List of Figures P 660W Tx v2 User s Guide 22 ...
Страница 25: ...25 PART I Introduction Introducing the ZyXEL Device 27 Introducing the Web Configurator 31 ...
Страница 26: ...26 ...
Страница 30: ...Chapter 1 Introducing the ZyXEL Device P 660W Tx v2 User s Guide 30 ...
Страница 36: ...Chapter 2 Introducing the Web Configurator P 660W Tx v2 User s Guide 36 ...
Страница 37: ...37 PART II Setup Wizard Connection Setup Wizard 39 Media Bandwidth Management Wizard 47 ...
Страница 38: ...38 ...
Страница 46: ...Chapter 3 Connection Setup Wizard P 660W Tx v2 User s Guide 46 ...
Страница 50: ...Chapter 4 Media Bandwidth Management Wizard P 660W Tx v2 User s Guide 50 ...
Страница 52: ...52 ...
Страница 83: ...Chapter 7 WAN Setup P 660W Tx v2 User s Guide 83 Figure 32 WAN Setup PPPoE ...
Страница 104: ...Chapter 8 Network Address Translation NAT Screens P 660W Tx v2 User s Guide 104 ...
Страница 130: ...Chapter 11 Firewall Configuration P 660W Tx v2 User s Guide 130 ...
Страница 156: ...Chapter 15 Logs Screens P 660W Tx v2 User s Guide 156 ...
Страница 169: ...169 PART IV Maintenance Maintenance 171 ...
Страница 170: ...170 ...
Страница 184: ...Chapter 17 Maintenance P 660W Tx v2 User s Guide 184 ...
Страница 185: ...185 PART V Troubleshooting and Specifications Troubleshooting 187 Product Specifications 193 ...
Страница 186: ...186 ...
Страница 192: ...Chapter 18 Troubleshooting P 660W Tx v2 User s Guide 192 ...
Страница 200: ...200 ...
Страница 208: ...Appendix A Pop up Windows JavaScripts and Java Permissions P 660W Tx v2 User s Guide 208 ...
Страница 226: ...Appendix C Common Services P 660W Tx v2 User s Guide 226 ...
Страница 232: ...Appendix D Legal Information P 660W Tx v2 User s Guide 232 ...
Страница 244: ...Index P 660W Tx v2 User s Guide 244 ...