
Chapter 6 Wireless
P-661HNU-Fx User’s Guide
130
You can use the MAC address filter to tell the ZyXEL Device which devices are
allowed or not allowed to use the wireless network. If a device is allowed to use
the wireless network, it still has to have the correct information (SSID, channel,
and security). If a device is not allowed to use the wireless network, it does not
matter if it has the correct information.
This type of security does not protect the information that is sent in the wireless
network. Furthermore, there are ways for unauthorized wireless devices to get the
MAC address of an authorized device. Then, they can use that MAC address to use
the wireless network.
6.7.2.3 User Authentication
Authentication is the process of verifying whether a wireless device is allowed to
use the wireless network. You can make every user log in to the wireless network
before using it. However, every device in the wireless network has to support IEEE
802.1x to do this.
For wireless networks, you can store the user names and passwords for each user
in a RADIUS server. This is a server used in businesses more than in homes. If you
do not have a RADIUS server, you cannot set up user names and passwords for
your users.
Unauthorized wireless devices can still see the information that is sent in the
wireless network, even if they cannot use the wireless network. Furthermore,
there are ways for unauthorized wireless users to get a valid user name and
password. Then, they can use that user name and password to use the wireless
network.
6.7.2.4 Encryption
Wireless networks can use encryption to protect the information that is sent in the
wireless network. Encryption is like a secret code. If you do not know the secret
code, you cannot understand the message.
The types of encryption you can choose depend on the type of authentication.
(See
for information about this.)
Table 23
Types of Encryption for Each Type of Authentication
NO AUTHENTICATION RADIUS SERVER
Weakest
No Security
WPA
Static WEP
WPA-PSK
Strongest
WPA2-PSK
WPA2
Содержание P-661H-61
Страница 2: ......
Страница 8: ...Safety Warnings P 661HNU Fx User s Guide 8...
Страница 10: ...Contents Overview P 661HNU Fx User s Guide 10...
Страница 18: ...Table of Contents P 661HNU Fx User s Guide 18 Appendix G Legal Information 393 Index 1...
Страница 19: ...19 PART I User s Guide...
Страница 20: ...20...
Страница 28: ...Chapter 1 Introduction P 661HNU Fx User s Guide 28...
Страница 36: ...Chapter 2 Introducing the Web Configurator P 661HNU Fx User s Guide 36...
Страница 79: ...79 PART II Technical Reference...
Страница 80: ...80...
Страница 86: ...Chapter 4 Connection Status and System Info Screens P 661HNU Fx User s Guide 86...
Страница 140: ...Chapter 6 Wireless P 661HNU Fx User s Guide 140...
Страница 172: ...Chapter 8 Routing P 661HNU Fx User s Guide 172...
Страница 176: ...Chapter 9 DNS Route P 661HNU Fx User s Guide 176...
Страница 260: ...Chapter 24 Backup Restore P 661HNU Fx User s Guide 260...
Страница 281: ...Chapter 27 Product Specifications P 661HNU Fx User s Guide 281...
Страница 282: ...Chapter 27 Product Specifications P 661HNU Fx User s Guide 282...
Страница 334: ...Appendix C Pop up Windows Java Script and Java Permissions P 661HNU Fx User s Guide 334...
Страница 358: ...Appendix D Wireless LANs P 661HNU Fx User s Guide 358...
Страница 392: ...Appendix F Open Software Announcements P 661HNU Fx User s Guide 392...
Страница 403: ...Index P 661HNU Fx User s Guide 403...
Страница 404: ...Index P 661HNU Fx User s Guide 404...