Page 56 / 74 Scroll up to view Page 51 - 55
Using the Configuration Interface
56
D-Link Systems, Inc.
4.
Changing the Wireless Network Name (SSID - used for wireless devices only)
It is always a good idea to change the wireless network name (SSID) from the default value.
Leaving
it in the default state is usually a good indication to intruders that all settings (including security) are
probably defaults. This setting identifies your wireless network. Make sure that the name you choose
is not commonly known or something that is easy to guess. Try using a combination of letters and
numbers to add complexity to it.
5.
Set the Visibility Status to Invisible
Wireless routers typically broadcast the wireless network name (SSID) to users attempting to connect
to a wireless network. By setting the Visibility Status to Invisible, all devices attempting to connect to
the router will need to know the wireless network name (SSID) in order to connect.
6.
Enable WPA Personal or Enterprise
Along with changing the wireless network name and setting the visibility status to invisible, we highly
recommended that you enable some sort of encryption feature. There are different methods of securing
wireless transmissions, but the most effective is WPA-Personal and WPA-Enterprise.
WPA-Personal
is easier to configure but does not offer the extensive level of security that WPA Enterprise does. If
you have the infrastructure to support WPA Enterprise, we recommend that you use this method. If
not, then WPA-Personal will suffice.
7.
Set up MAC Filtering
Each networking device (router, access point, wireless card, etc.) on a network contains a unique
hexadecimal number that identifies that specific product.
This number is referred to as a MAC
address.
MAC filtering allows you to create a list of the MAC address of each device on your network
and only allows these specific devices to associate with your network. With this feature enabled,
devices attempting to connect to your network with a MAC address that is not in the list you created,
will be denied access.
Page 57 / 74
Appendix
57
D-Link Systems, Inc.
Glossary
A
Access Control List -
ACL.
Database of network devices that are allowed to access resources on the
network.
Access Point -
AP. Device that allows wireless clients to connect to it and access the network
Ad-hoc network -
Peer-to-Peer network between wireless clients
Address Resolution Protocol -
ARP. Used to map MAC addresses to IP addresses so that conversions can
be made in both directions.
ADSL -
Asymmetric Digital Subscriber Line
Advanced Encryption Standard -
AES. Government encryption standard
Alphanumeric -
Characters A-Z and 0-9
Antenna -
Used to transmit and receive RF signals.
AppleTalk –
A set of Local Area Network protocols developed by Apple for their computer systems
AppleTalk Address Resolution Protocol –
AARP. Used to map the MAC addresses of Apple computers to
their AppleTalk network addresses, so that conversions can be made in both directions.
Application layer -
7th Layer of the OSI model. Provides services to applications to ensure that they can
communicate properly with other applications on a network.
ASCII -
American Standard Code for Information Interchange. This system of characters is most commonly
used for text files
Attenuation –
The loss in strength of digital an analog signals. The loss is greater when the signal is being
transmitted over long distances.
Authentication –
To provide credentials, like a Password, in order to verify that the person or device is really
who they are claiming to be
Automatic Private IP Addressing -
APIPA. An IP address that a Windows computer will assign itself when it
is configured to obtain an IP address automatically but no DHCP server is available on the network
Page 58 / 74
Appendix
58
D-Link Systems, Inc.
B
Backward Compatible -
The ability for new devices to communicate and interact with older legacy devices to
guarantee interoperability
Bandwidth -
The maximum amount of bytes or bits per second that can be transmitted to and from a network
device
Basic Input/Output System –
BIOS. A program that the processor of a computer uses to startup the system
once it is turned on
Baud –
Data transmission speed
Bit rate –
The amount of bits that pass in given amount of time
bit/sec –
bits per second
BOOTP –
Bootstrap Protocol.
Allows for computers to be booted up and given an IP address with no user
intervention
Bottleneck –
A time during processes when something causes the process to slowdown or stop all together
Broadband –
A wide band of frequencies available for transmitting data
Broadcast –
Transmitting data in all directions at once
Browser –
A program that allows you to access resources on the web and provides them to you graphically
C
Cable modem –
A device that allows you to connect a computer up to a coaxial cable and receive Internet
access from your Cable provider
CardBus –
A newer version of the PC Card or PCMCIA interface.
It supports a 32-bit data path, DMA, and
consumes less voltage
Carrier Sense Multiple Access/Collision Avoidance –
CSMA/CA
Carrier Sense Multiple Access/Collision Detect –
CSMA/CD
CAT 5 –
Category 5. Used for 10/100 Mbps or 1Gbps Ethernet connections
Client –
A program or user that requests data from a server
Collision –
When do two devices on the same Ethernet network try and transmit data at the exact same
time.
Cookie – I
nformation that is stored on the hard drive of your computer that holds your preferences to the site
that gave your computer the cookie
CSMA/CA –
Carrier Sense Multiple Access/Collision Avoidance
CSMA/CD –
Carrier Sense Multiple Access/Collision Detection
Page 59 / 74
Appendix
59
D-Link Systems, Inc.
D
Data –
Information that has been translated into binary do that it can be processed or moved to another
device
Data Encryption Standard –
Uses a randomly selected 56-bit key that must be known by both the sender and
the receiver when information is exchanged
Data-Link layer –
The second layer of the OSI model.
Controls the movement of data on the physical link of
a network
Database –
Organizes information so that it can be managed updated, as well as easily accessed by users
or applications.
DB-25 –
A 25 ping male connector for attaching External modems or RS-232 serial devices
DB-9 –
A 9 pin connector for RS-232 connections
dBd -
decibels related to dipole antenna
dBi -
decibels relative to isotropic radiator
dBm -
decibels relative to one milliwatt
Decrypt –
To unscramble an encrypted message back into plain text
Default
– A predetermined value or setting that is used by a program when no user input has been entered
for this value or setting
Demilitarized zone – DMZ.
A single computer or group of computers that can be accessed by both users on
the Internet as well as users on the Local Network, but that is not protected by the same security as the Local
Network.
DHCP – Dynamic Host Configuration Protocol.
Used to automatically assign IP addresses from a predefined
pool of addresses to computers or devices that requests them
Digital certificate –
An electronic method of providing credentials to a server in order to have access to it or
a network
Direct Sequence Spread Spectrum – DSSS. Modulation technique used by 802.11b wireless devices
DNS – Domain Name System.
Translates Domain Names to IP addresses
DOCSIS –
Data Over Cable Service Interface Specifications.
The standard interface for cable modems
Domain name –
A name that is associated with an IP address
Download –
To send a request from one computer to another and have the file transmitted back to the
requesting computer
DSL –
Digital Subscriber Line.
High bandwidth Internet connection over telephone lines
Duplex –
Sending and Receiving data transmissions at the sane time
Dynamic DNS service –
DDNS is provided by companies to allow users with Dynamic IP addresses to obtain
a Domain Name that will always by linked to their changing IP address.
The IP address is updated by either
client software running on a computer or by a router that supports DDNS, whenever the IP address changes
Page 60 / 74
Appendix
60
D-Link Systems, Inc.
Dynamic IP address –
IP address that is assigned by a DHCP server and that may change.
Cable Internet
providers usually use this method to assign IP addresses to their customers.
E
EAP –
Extensible Authentication Protocol
Email –
Electronic Mail is a computer-stored message that is transmitted over the Internet
Encryption –
Converting data into cyphertext so that it cannot be easily read
Enterprise –
Large organizations that use computers
Ethernet –
The most widely used technology for Local Area Networks.
F
Fiber optic –
A way of sending data through light impulses over glass or plastic wire or fiber
File server –
A computer on a network that stores data so that the other computers on the network can all
access it
File sharing –
Allowing data from computers on a network to be accessed by other computers on the network
will different levels of access rights
Firewall –
A device that protects resources of the Local Area Network from unauthorized users outside of the
local network
Firmware –
Programming that is inserted into a hardware device that tells it how to function
Fragmentation –
Breaking up data into smaller pieces to make it easier to store
FTP –
File Transfer Protocol.
Easiest way to transfer files between computers on the Internet
Full-duplex –
Sending and Receiving data at the same time
G
Gain –
The amount an amplifier boosts the wireless signal
Gateway –
A device that connects your network to another, like the internet
Gbps –
Gigabits per second
Gigabit Ethernet –
Transmission technology that provides a data rate of 1 billion bits per second
Graphical user interface –
GUI
H
H.323 –
A standard that provides consistency of voice and video transmissions and compatibility for
videoconferencing devices

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top