Additional Wireless Terms; Wireless Security Overview - ZyXEL Communications P870HNU-51B User Manual

802.11n wireless vdsl2 4-port gateway
Hide thumbs Also See for P870HNU-51B:
Table of Contents

Advertisement

Chapter 7 Wireless LAN

7.8.2 Additional Wireless Terms

The following table describes some wireless network terms and acronyms used in the Device's Web
Configurator.
Table 42 Additional Wireless Terms
TERM
RTS/CTS Threshold
Preamble
Authentication
Fragmentation
Threshold

7.8.3 Wireless Security Overview

The following sections introduce different types of wireless security you can set up in the wireless
network.
7.8.3.1 SSID
Normally, the Device acts like a beacon and regularly broadcasts the SSID in the area. You can hide
the SSID instead, in which case the Device does not broadcast the SSID. In addition, you should
change the default SSID to something that is difficult to guess.
This type of security is fairly weak, however, because there are ways for unauthorized wireless
devices to get the SSID. In addition, unauthorized wireless devices can still see the information that
is sent in the wireless network.
7.8.3.2 MAC Address Filter
Every device that can use a wireless network has a unique identification number, called a MAC
1
address.
00A0C5000002 or 00:A0:C5:00:00:02. To get the MAC address for each device in the wireless
network, see the device's User's Guide or other documentation.
You can use the MAC address filter to tell the Device which devices are allowed or not allowed to
use the wireless network. If a device is allowed to use the wireless network, it still has to have the
1.
Some wireless devices, such as scanners, can detect wireless networks but cannot use wireless networks. These kinds
of wireless devices might not have MAC addresses.
2.
Hexadecimal characters are 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, and F.
142
DESCRIPTION
In a wireless network which covers a large area, wireless devices are
sometimes not aware of each other's presence. This may cause them to
send information to the AP at the same time and result in information
colliding and not getting through.
By setting this value lower than the default value, the wireless devices must
sometimes get permission to send information to the Device. The lower the
value, the more often the devices must get permission.
If this value is greater than the fragmentation threshold value (see below),
then wireless devices never have to get permission to send information to
the Device.
A preamble affects the timing in your wireless network. There are two
preamble modes: long and short. If a device uses a different preamble mode
than the Device does, it cannot communicate with the Device.
The process of verifying whether a wireless device is allowed to use the
wireless network.
A small fragmentation threshold is recommended for busy networks, while a
larger threshold provides faster performance if the network is not very busy.
A MAC address is usually written using twelve hexadecimal characters
2
; for example,
P-870HNU-51b User's Guide

Advertisement

Table of Contents
loading

Table of Contents