Chapter 11 Wireless LAN
NBG-419N User’s Guide
90
•
Use the
Advanced
screen (
Section 11.6 on page 98
) to allow wireless advanced features, such
as intra-BSS networking and set the
RTS/CTS Threshold.
•
Use the
QoS
screen (
Section 11.7 on page 100
) to set priority levels to services, such as e-mail,
VoIP, chat, and so on.
•
Use the
WPS
screen (
Section 11.8 on page 101
) to quickly set up a wireless network with strong
security, without having to configure security settings manually.
•
Use the
WPS Station
screen (
Section 11.9 on page 102
) to add a wireless station using WPS.
•
Use the
Scheduling
screen (
Section 11.10 on page 103
) to set the times your wireless LAN is
turned on and off.
•
Use the
WDS
screen (
Section 11.11 on page 104
) to configure Wireless Distribution System on
your NBG-419N.
11.3
What You Should Know
Every wireless network must follow these basic guidelines.
•
Every wireless client in the same wireless network must use the same SSID.
The SSID is the name of the wireless network. It stands for Service Set IDentity.
•
If two wireless networks overlap, they should use different channels.
Like radio stations or television channels, each wireless network uses a specific channel, or
frequency, to send and receive information.
•
Every wireless client in the same wireless network must use security compatible with the AP.
Security stops unauthorized devices from using the wireless network. It can also protect the
information that is sent in the wireless network.
11.3.1
Wireless Security Overview
The following sections introduce different types of wireless security you can set up in the wireless
network.
11.3.1.1
SSID
Normally, the AP acts like a beacon and regularly broadcasts the SSID in the area. You can hide the
SSID instead, in which case the AP does not broadcast the SSID. In addition, you should change
the default SSID to something that is difficult to guess.
This type of security is fairly weak, however, because there are ways for unauthorized devices to
get the SSID. In addition, unauthorized devices can still see the information that is sent in the
wireless network.
11.3.1.2
MAC Address Filter
Every wireless client has a unique identification number, called a MAC address.
1
A MAC address is
usually written using twelve hexadecimal characters
2
; for example, 00A0C5000002 or
1.
Some wireless devices, such as scanners, can detect wireless networks but cannot use wireless networks. These kinds
of wireless devices might not have MAC addresses.
2.
Hexadecimal characters are 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, and F.