ZyXEL Communications P-2612HW-F1 User Manual page 141

802.11g wireless adsl voip iad
Hide thumbs Also See for P-2612HW-F1:
Table of Contents

Advertisement

• An access point is a radio with a wired connection to a network, which can
connect with numerous wireless clients and let them access the network.
• A bridge is a radio that relays communications between access points and
wireless clients, extending a network's range.
Traditionally, a wireless network operates in one of two ways.
• An "infrastructure" type of network has one or more access points and one or
more wireless clients. The wireless clients connect to the access points.
• An "ad-hoc" type of network is one in which there is no access point. Wireless
clients connect to one another in order to exchange information.
Security
Security stops unauthorized devices from using the wireless network. It can also
protect the information that is sent in the wireless network.Use the strongest
security that every wireless client in the wireless network supports.
Table 24 Wireless Security Levels
SECURITY
LEVEL
Weakest
Strongest
Note: WPA2 or WPA2-PSK security is recommended.
• WPA2-PSK and WPA-PSK do not employ user authentication and are known as
the personal version of WPA.
• WEP is better than no security, but it is still possible for unauthorized devices to
figure out the original information pretty quickly.
MAC Address Filter
Every Ethernet device has a unique MAC (Media Access Control) address. The MAC
address consists of twelve hexadecimal characters (0-9, and A to F), and it is
usually written in the following format: "0A:A0:00:BB:CC:DD".
P-2612HW-F1 User's Guide
SECURITY TYPE
No Security
MAC Address Filtering
WEP Encryption
IEEE 802.1x EAP with RADIUS Server
Authentication
WPA-PSK (Wi-Fi Protected Access Pre-Shared
Key)
WPA (Wi-Fi Protected Access)
WPA-PSK2
WPA2
Chapter 8 Wireless LAN
141

Advertisement

Table of Contents
loading

Table of Contents