Service Sets And Ssids; Wireless Security - Hitron CODA-4*8 Series DOCSIS User Manual

Wifi gateway
Table of Contents

Advertisement

5.1.5

Service Sets and SSIDs

Each wireless network, including all the devices that comprise it, is known as a
Service Set.
NOTE:
Depending on its capabilities and configuration, a single wireless access
point may control multiple Service Sets; this is often done to provide different
service or security levels to different clients.
Each Service Set is identified by a Service Set IDentifier (SSID). This is the name of
the network. Wireless clients must know the SSID in order to be able to connect to
the AP. You can configure the CODA-4x8x to broadcast the SSID (in which case, any
client who scans the airwaves can discover the SSID), or to "hide" the SSID (in which
case it is not broadcast, and only users who already know the SSID can connect).
5.1.6

Wireless Security

Radio is inherently an insecure medium, since it can be intercepted by anybody in the
coverage area with a radio receiver. Therefore, a variety of techniques exist to control
authentication (identifying who should be allowed to join the network) and encryption
(signal scrambling so that only authenticated users can decode the transmitted data).
The sophistication of each security method varies, as does its effectiveness. The
CODA-4x8x supports the following wireless security protocols (in order of
effectiveness):
WPA-PSK (WiFi Protected Access - Pre-Shared Key): WPA was created to

solve the inadequacies of WEP, the Wired Equivalency Protocol, which is now
considered obsolete. There are two types of WPA: the "enterprise" version
(known simply as WPA) requires the use of a central authentication database
server, whereas the "personal" version (supported by the CODA-4x8x) allows
users to authenticate using a "pre-shared key" or password instead. While WPA
provides good security, it is still vulnerable to "brute force" password-guessing
attempts (in which an attacker simply barrages the AP with join requests using
different passwords), so for optimal security it is advised that you use a random
password of thirteen characters or more, containing no "dictionary" words.
WPA2-PSK: WPA2 is an improvement on WPA. The primary difference is that

WPA uses the Temporal Key Integrity Protocol (TKIP) encryption standard
(which has been shown to have certain possible weaknesses), whereas WPA2
uses the stronger Advanced Encryption Standard (AES) in the Counter mode
with Cipher block chaining Message authentication code Protocol (CCMP),
85
85
Version 1.0, 11/2016. Copyright
Version 1.0, 11/2016. Copyright
Hitron CODA-4x8x User's Guide
2012 Hitron Technologies
2016 Hitron Technologies

Advertisement

Table of Contents
loading

This manual is also suitable for:

Coda-4 8 series

Table of Contents