ZyXEL Communications P-660H-T Series User Manual

Page of 466
P-660H/HW-T Series User’ Guide
71
Chapter 5 Wireless LAN
• Use RADIUS authentication if you have a RADIUS server. See the appendices for 
information on protocols used when a client authenticates with a RADIUS server via the 
Prestige.
• Use the Local User Database if you have less than 32 wireless clients in your network. 
The Prestige uses MD5 encryption when a client authenticates with the Local User 
Database 
5.2.3  Restricted Access
The MAC Filter screen allows you to configure the AP to give exclusive access to devices 
(Allow Association) or exclude them from accessing the AP (Deny Association). 
5.2.4  Hide Prestige Identity
If you hide the ESSID, then the Prestige cannot be seen when a wireless client scans for local 
APs. The trade-off for the extra security of “hiding” the Prestige may be inconvenience for 
some valid WLAN clients. If you don’t hide the ESSID, at least you should change the default 
one.
5.3  The Main Wireless LAN Screen  
Click Wireless LAN in the navigation panel to display the main Wireless LAN screen.