Wireless Lan Security; 2.2.1 Data Encryption With Wep; Fragmentation Threshold; Figure 2-5 Roaming Example - ZyXEL Communications ZyAIR G-220 User Manual

802.11g wireless usb adapter
Hide thumbs Also See for ZyAIR G-220:
Table of Contents

Advertisement

ZyAIR G-220 User's Guide
The following figure depicts a roaming example. When wireless station B moves to position X, the ZyAIR
in wireless station B automatically switches the channel to the one used by access point 2 in order to stay
connected to the network.
2.2

Wireless LAN Security

Wireless LAN security is vital to your network to protect wireless communications.
Configure the wireless LAN security using the More Setting... screen. If you do not enable any wireless
security on your ZyAIR, the ZyAIR's wireless communications are accessible to any wireless networking
device that is in the coverage area.

2.2.1 Data Encryption with WEP

WEP (Wired Equivalent Privacy) encryption scrambles all data packets transmitted between the ZyAIR and
the AP or other wireless stations to keep network communications private. Both the wireless stations and
the access points must use the same WEP key for data encryption and decryption.
Your ZyAIR allows you to configure up to four 64-bit, 128-bit or 256-bit WEP keys but only one key can
be used at any one time.
2.3

Fragmentation Threshold

A Fragmentation Threshold is the maximum data fragment size (between 256 and 2432 bytes) that can be
sent in the wireless network before the ZyAIR will fragment the packet into smaller data frames.
2-4

Figure 2-5 Roaming Example

Wireless Station Mode Configuration

Advertisement

Table of Contents
loading

Table of Contents