Chapter 7 Wireless
VSG1435-B101 Series User’s Guide
118
7.9.3 Wireless Security Overview
By their nature, radio communications are simple to intercept. For wireless data
networks, this means that anyone within range of a wireless network without
security can not only read the data passing over the airwaves, but also join the
network. Once an unauthorized person has access to the network, he or she can
steal information or introduce malware (malicious software) intended to
compromise the network. For these reasons, a variety of security systems have
been developed to ensure that only authorized people can use a wireless data
network, or understand the data carried on it.
These security standards do two things. First, they authenticate. This means that
only people presenting the right credentials (often a username and password, or a
“key” phrase) can access the network. Second, they encrypt. This means that the
information sent over the air is encoded. Only people with the code key can
understand the information, and only people who have been authenticated are
given the code key.
These security standards vary in effectiveness. Some can be broken, such as the
old Wired Equivalent Protocol (WEP). Using WEP is better than using no security at
all, but it will not keep a determined attacker out. Other security standards are
secure in themselves but can be broken if a user does not use them properly. For
example, the WPA-PSK security standard is very secure if you use a long key
which is difficult for an attacker’s software to guess - for example, a twenty-letter
long string of apparently random numbers and letters - but it is not very secure if
you use a short key which is very easy to guess - for example, a three-letter word
from the dictionary.
Because of the damage that can be done by a malicious attacker, it’s not just
people who have sensitive information on their network who should use security.
Everybody who uses any wireless network should ensure that effective security is
in place.
A good way to come up with effective security keys, passwords and so on is to use
obscure information that you personally will easily remember, and to enter it in a
way that appears random and does not include real words. For example, if your
mother owns a 1970 Dodge Challenger and her favorite movie is Vanishing Point
(which you know was made in 1971) you could use “70dodchal71vanpoi” as your
security key.
The following sections introduce different types of wireless security you can set up
in the wireless network.
7.9.3.1 SSID
Normally, the ZyXEL Device acts like a beacon and regularly broadcasts the SSID
in the area. You can hide the SSID instead, in which case the ZyXEL Device does
Содержание VSG1435-B101 - V1.10
Страница 2: ......
Страница 8: ...Safety Warnings VSG1435 B101 Series User s Guide 8 ...
Страница 10: ...Contents Overview VSG1435 B101 Series User s Guide 10 ...
Страница 20: ...Table of Contents VSG1435 B101 Series User s Guide 20 ...
Страница 21: ...21 PART I User s Guide ...
Страница 22: ...22 ...
Страница 42: ...Chapter 2 The Web Configurator VSG1435 B101 Series User s Guide 42 ...
Страница 71: ...71 PART II Technical Reference ...
Страница 72: ...72 ...
Страница 78: ...Chapter 5 Network Map and Status Screens VSG1435 B101 Series User s Guide 78 ...
Страница 150: ...Chapter 8 Home Networking VSG1435 B101 Series User s Guide 150 ...
Страница 154: ...Chapter 9 Static Routing VSG1435 B101 Series User s Guide 154 ...
Страница 178: ...Chapter 11 Policy Forwarding VSG1435 B101 Series User s Guide 178 ...
Страница 196: ...Chapter 12 Network Address Translation NAT VSG1435 B101 Series User s Guide 196 ...
Страница 202: ...Chapter 13 Dynamic DNS Setup VSG1435 B101 Series User s Guide 202 ...
Страница 228: ...Chapter 16 Firewall VSG1435 B101 Series User s Guide 228 ...
Страница 234: ...Chapter 18 Parental Control VSG1435 B101 Series User s Guide 234 ...
Страница 282: ...Chapter 25 Traffic Status VSG1435 B101 Series User s Guide 282 ...
Страница 286: ...Chapter 26 IGMP Status VSG1435 B101 Series User s Guide 286 ...
Страница 294: ...Chapter 28 Remote Management VSG1435 B101 Series User s Guide 294 ...
Страница 298: ...Chapter 29 Time Settings VSG1435 B101 Series User s Guide 298 ...
Страница 302: ...Chapter 30 Logs Setting VSG1435 B101 Series User s Guide 302 ...
Страница 318: ...Chapter 34 Troubleshooting VSG1435 B101 Series User s Guide 318 ...
Страница 348: ...Appendix A Setting up Your Computer s IP Address VSG1435 B101 Series User s Guide 348 ...
Страница 358: ...Appendix B IP Addresses and Subnetting VSG1435 B101 Series User s Guide 358 ...
Страница 368: ...Appendix C Pop up Windows JavaScripts and Java Permissions VSG1435 B101 Series User s Guide 368 ...
Страница 384: ...Appendix D Wireless LANs VSG1435 B101 Series User s Guide 384 ...
Страница 412: ...Index VSG1435 B101 Series User s Guide 412 ...