Signal Problems - ZyXEL Communications VMG Series User Manual

Hide thumbs Also See for VMG Series:
Table of Contents

Advertisement

This type of security does not protect the information that is sent in the wireless network. Furthermore,
there are ways for unauthorized wireless devices to get the MAC address of an authorized device. Then,
they can use that MAC address to use the wireless network.
7.11.3.3 User Authentication
Authentication is the process of verifying whether a wireless device is allowed to use the wireless
network. You can make every user log in to the wireless network before using it. However, every device
in the wireless network has to support IEEE 802.1x to do this.
For wireless networks, you can store the user names and passwords for each user in a RADIUS server. This
is a server used in businesses more than in homes. If you do not have a RADIUS server, you cannot set up
user names and passwords for your users.
Unauthorized wireless devices can still see the information that is sent in the wireless network, even if they
cannot use the wireless network. Furthermore, there are ways for unauthorized wireless users to get a
valid user name and password. Then, they can use that user name and password to use the wireless
network.
7.11.3.4 Encryption
Wireless networks can use encryption to protect the information that is sent in the wireless network.
Encryption is like a secret code. If you do not know the secret code, you cannot understand the
message.
The types of encryption you can choose depend on the type of authentication. (See
page 174
for information about this.)
Table 51 Types of Encryption for Each Type of Authentication
Weakest
Strongest
For example, if the wireless network has a RADIUS server, you can choose WPA or WPA2. If users do not
log in to the wireless network, you can choose no encryption, WPA-PSK, or WPA2-PSK.
Note: It is recommended that wireless networks use WPA-PSK, WPA, or stronger encryption.
The other types of encryption are better than none at all, but it is still possible for
unauthorized wireless devices to figure out the original information pretty quickly.
Many types of encryption use a key to protect the information in the wireless network. The longer the
key, the stronger the encryption. Every device in the wireless network must have the same key.

7.11.4 Signal Problems

Because wireless networks are radio networks, their signals are subject to limitations of distance,
interference and absorption.
Chapter 7 Wireless
NO AUTHENTICATION
No Security
WPA-PSK
WPA2-PSK
VMG/XMG Series User's Guide
RADIUS SERVER
WPA
WPA2
174
Section 7.11.3.3 on

Advertisement

Table of Contents
loading

Table of Contents