What You Can Do; What You Should Know - ZyXEL Communications NBG6604 User Manual

Ac1200 dual-band wireless router
Hide thumbs Also See for NBG6604:
Table of Contents

Advertisement

10.1.1 What You Can Do

• Use the Wireless screen to enable or disable the 2.4GHz or 5GHz wireless LAN, set up wireless security
between the NBG6604 and the wireless clients, and make other basic configuration changes
10.2 on page
• Use the Guest Wireless screen to set up multiple wireless networks on your NBG6604
page
72).
• Use the MAC Filter screen to allow or deny wireless stations based on their MAC addresses from
connecting to the NBG6604
• Use the Advanced screen to allow intra-BSS networking and set the RTS/CTS Threshold
page
76).
• Use the WPS screen to quickly set up a wireless network with strong security, without having to
configure security settings manually
• Use the Scheduling screen to set the times your wireless LAN is turned on and off
page
78).

10.1.2 What You Should Know

Every wireless network must follow these basic guidelines.
• Every wireless client in the same wireless network must use the same SSID.
The SSID is the name of the wireless network. It stands for Service Set IDentity.
• If two wireless networks overlap, they should use different channels.
Like radio stations or television channels, each wireless network uses a specific channel, or frequency,
to send and receive information.
• Every wireless client in the same wireless network must use security compatible with the AP.
Security stops unauthorized devices from using the wireless network. It can also protect the
information that is sent in the wireless network.
Wireless Security Overview
The following sections introduce different types of wireless security you can set up in the wireless
network.
SSID
Normally, the AP acts like a beacon and regularly broadcasts the SSID in the area. You can hide the
SSID instead, in which case the AP does not broadcast the SSID. In addition, you should change the
default SSID to something that is difficult to guess.
This type of security is fairly weak, however, because there are ways for unauthorized devices to get the
SSID. In addition, unauthorized devices can still see the information that is sent in the wireless network.
Chapter 10 Wireless LAN
68).
(Section 10.5 on page
(Section 10.7 on page
NBG6604 User's Guide
75).
77).
64
(Section
(Section 10.4 on
(Section 10.6 on
(Section 10.8 on

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents