Page 96 / 344 Scroll up to view Page 91 - 95
Chapter 6 Wireless
P-2601HN(L)-F1 Series User’s Guide
96
Click
Network Setting > Wireless > WMM
. The following screen displays.
Figure 26
Network Setting > Wireless > WMM
The following table describes the labels in this screen.
Table 16
Network Setting > Wireless > WMM
LABEL
DESCRIPTION
Enable WMM of
SSID1~4
This enables the ZyXEL Device to automatically give a service a priority
level according to the ToS value in the IP header of packets it sends.
WMM QoS (Wifi MultiMedia Quality of Service) gives high priority to voice
and video, which makes them run more smoothly.
Enable WMM
Automatic
Power Save
Deliver (APSD)
Click this to increase battery life for battery-powered wireless clients.
APSD uses a longer beacon interval when transmitting traffic that does
not require a short packet exchange interval.
Apply
Click
Apply
to save your changes.
Cancel
Click
Cancel
to restore your previously saved settings.
Page 97 / 344
Chapter 6 Wireless
P-2601HN(L)-F1 Series User’s Guide
97
6.6
Scheduling Screen
Click
Network Setting > Wireless > Scheduling
to open the
Wireless LAN
Scheduling
screen. Use this screen to configure when the ZyXEL Device enables
or disables the wireless LAN.
Figure 27
Network Setting > Wireless > Scheduling
The following table describes the labels in this screen.
6.7
Technical Reference
This section discusses wireless LANs in depth. For more information, see the
appendix.
Table 17
Network Setting > Wireless > Scheduling
LABEL
DESCRIPTION
Wireless LAN
Scheduling
Select
Enable
to activate wireless LAN scheduling on your ZyXEL
Device.
WLAN status
Select
On
or
Off
to enable or disable the wireless LAN.
Day
Select the day(s) you want to turn the wireless LAN on or off.
Except for the
following times
Specify the time period during which to apply the schedule.
For example, you want the wireless network to be only available during
work hours. Check Mon ~ Fri in the day column, and specify 8:00 ~
18:00 in the time table.
Apply
Click
Apply
to save your changes.
Cancel
Click
Cancel
to restore your previously saved settings.
Page 98 / 344
Chapter 6 Wireless
P-2601HN(L)-F1 Series User’s Guide
98
6.7.1
Additional Wireless Terms
The following table describes some wireless network terms and acronyms used in
the ZyXEL Device’s web configurator.
6.7.2
Wireless Security Overview
By their nature, radio communications are simple to intercept. For wireless data
networks, this means that anyone within range of a wireless network without
security can not only read the data passing over the airwaves, but also join the
network. Once an unauthorized person has access to the network, he or she can
steal information or introduce malware (malicious software) intended to
compromise the network. For these reasons, a variety of security systems have
been developed to ensure that only authorized people can use a wireless data
network, or understand the data carried on it.
These security standards do two things. First, they authenticate. This means that
only people presenting the right credentials (often a username and password, or a
“key” phrase) can access the network. Second, they encrypt. This means that the
information sent over the air is encoded. Only people with the code key can
understand the information, and only people who have been authenticated are
given the code key.
Table 18
Additional Wireless Terms
TERM
DESCRIPTION
RTS/CTS Threshold
In a wireless network which covers a large area, wireless devices
are sometimes not aware of each other’s presence.
This may cause
them to send information to the AP at the same time and result in
information colliding and not getting through.
By setting this value lower than the default value, the wireless
devices must sometimes get permission to send information to the
ZyXEL Device. The lower the value, the more often the devices must
get permission.
If this value is greater than the fragmentation threshold value (see
below), then wireless devices never have to get permission to send
information to the ZyXEL Device.
Preamble
A preamble affects the timing in your wireless network. There are
two preamble modes: long and short. If a device uses a different
preamble mode than the ZyXEL Device does, it cannot communicate
with the ZyXEL Device.
Authentication
The process of verifying whether a wireless device is allowed to use
the wireless network.
Fragmentation
Threshold
A small fragmentation threshold is recommended for busy networks,
while a larger threshold provides faster performance if the network
is not very busy.
Page 99 / 344
Chapter 6 Wireless
P-2601HN(L)-F1 Series User’s Guide
99
These security standards vary in effectiveness. Some can be broken, such as the
old Wired Equivalent Protocol (WEP). Using WEP is better than using no security at
all, but it will not keep a determined attacker out. Other security standards are
secure in themselves but can be broken if a user does not use them properly. For
example, the WPA-PSK security standard is very secure if you use a long key
which is difficult for an attacker’s software to guess - for example, a twenty-letter
long string of apparently random numbers and letters - but it is not very secure if
you use a short key which is very easy to guess - for example, a three-letter word
from the dictionary.
Because of the damage that can be done by a malicious attacker, it’s not just
people who have sensitive information on their network who should use security.
Everybody who uses any wireless network should ensure that effective security is
in place.
A good way to come up with effective security keys, passwords and so on is to use
obscure information that you personally will easily remember, and to enter it in a
way that appears random and does not include real words. For example, if your
mother owns a 1970 Dodge Challenger and her favorite movie is Vanishing Point
(which you know was made in 1971) you could use “70dodchal71vanpoi” as your
security key.
The following sections introduce different types of wireless security you can set up
in the wireless network.
6.7.2.1
SSID
Normally, the ZyXEL Device acts like a beacon and regularly broadcasts the SSID
in the area. You can hide the SSID instead, in which case the ZyXEL Device does
not broadcast the SSID. In addition, you should change the default SSID to
something that is difficult to guess.
This type of security is fairly weak, however, because there are ways for
unauthorized wireless devices to get the SSID. In addition, unauthorized wireless
devices can still see the information that is sent in the wireless network.
6.7.2.2
MAC Address Filter
Every device that can use a wireless network has a unique identification number,
called a MAC address.
1
A MAC address is usually written using twelve hexadecimal
characters
2
; for example, 00A0C5000002 or 00:A0:C5:00:00:02. To get the MAC
address for each device in the wireless network, see the device’s User’s Guide or
other documentation.
1.
Some wireless devices, such as scanners, can detect wireless networks but cannot use wireless networks.
These kinds of wireless devices might not have MAC addresses.
2.
Hexadecimal characters are 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, and F.
Page 100 / 344
Chapter 6 Wireless
P-2601HN(L)-F1 Series User’s Guide
100
You can use the MAC address filter to tell the ZyXEL Device which devices are
allowed or not allowed to use the wireless network. If a device is allowed to use
the wireless network, it still has to have the correct information (SSID, channel,
and security). If a device is not allowed to use the wireless network, it does not
matter if it has the correct information.
This type of security does not protect the information that is sent in the wireless
network. Furthermore, there are ways for unauthorized wireless devices to get the
MAC address of an authorized device. Then, they can use that MAC address to use
the wireless network.
6.7.2.3
User Authentication
Authentication is the process of verifying whether a wireless device is allowed to
use the wireless network. You can make every user log in to the wireless network
before using it. However, every device in the wireless network has to support IEEE
802.1x to do this.
For wireless networks, you can store the user names and passwords for each user
in a RADIUS server. This is a server used in businesses more than in homes. If you
do not have a RADIUS server, you cannot set up user names and passwords for
your users.
Unauthorized wireless devices can still see the information that is sent in the
wireless network, even if they cannot use the wireless network. Furthermore,
there are ways for unauthorized wireless users to get a valid user name and
password. Then, they can use that user name and password to use the wireless
network.
6.7.2.4
Encryption
Wireless networks can use encryption to protect the information that is sent in the
wireless network. Encryption is like a secret code. If you do not know the secret
code, you cannot understand the message.
The types of encryption you can choose depend on the type of authentication.
(See
Section 6.7.2.3 on page 100
for information about this.)
Table 19
Types of Encryption for Each Type of Authentication
NO AUTHENTICATION
RADIUS SERVER
Weakest
No Security
WPA
Static WEP
WPA-PSK
Strongest
WPA2-PSK
WPA2

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top