Wireless Lan Security; User Authentication And Encryption - ZyXEL Communications NWD2105 User Manual

Wireless n-lite usb adapter
Hide thumbs Also See for NWD2105:
Table of Contents

Advertisement

• If two wireless networks overlap, they should use a different channel.
Like radio stations or television channels, each wireless network uses a specific
channel, or frequency, to send and receive information.
• Every device in the same wireless network must use security compatible with
the AP or peer computer.
Security stops unauthorized devices from using the wireless network. It can also
protect the information that is sent in the wireless network.

3.3 Wireless LAN Security

Wireless LAN security is vital to your network to protect wireless communications.
If you do not enable any wireless security on your NWD2105, the NWD2105's
wireless communications are accessible to any wireless networking device that is
in the coverage area.
Note: You can use only WEP encryption if you set the NWD2105 to Ad-hoc mode.
See the appendices for more detailed information about wireless security.

3.3.1 User Authentication and Encryption

You can make every user log in to the wireless network before they can use it.
This is called user authentication. However, every wireless client in the wireless
network has to support IEEE 802.1x to do this.
Wireless networks can use encryption to protect the information that is sent in the
wireless network. Encryption is like a secret code. If you do not know the secret
code, you cannot understand the message.
3.3.1.1 WEP
3.3.1.1.1 Data Encryption
WEP (Wired Equivalent Privacy) encryption scrambles all data packets transmitted
between the NWD2105 and the AP or other wireless stations to keep network
communications private. Both the wireless stations and the access points must
use the same WEP key for data encryption and decryption.
There are two ways to create WEP keys in your NWD2105.
NWD2105 User's Guide
Chapter 3 Wireless LANs
39

Advertisement

Table of Contents
loading

Table of Contents