ZyXEL Communications P-660HW-TX User Manual

Page of 122
                                      
P-660HW-Tx v2 Series Support Notes
 
WLAN NICs often include an internal antenna which may provide sufficient 
reception. 
7. Why the 2.4 Ghz Frequency range?  
This frequency range has been set aside by the FCC, and is generally labeled 
the ISM band. A few years ago Apple and several other large corporations 
requested that the FCC allow the development of wireless networks within this 
frequency range. What we have today is a protocol and system that allows for 
unlicensed use of radios within a prescribed power level. The ISM band is 
populated by Industrial, Scientific and Medical devices that are all low power 
devices, but can interfere with each other.  
8. What is Server Set ID (SSID)?  
SSID is a configurable identification that allows clients to communicate to the 
appropriate base station. With proper configuration, only clients that are 
configured with the same SSID can communicate with base stations having 
the same SSID. SSID from a security point of view acts as a simple single 
shared password between base stations and clients. 
9. What is an ESSID?  
ESSID stands for Extended Service Set Identifier and identifies the wireless 
LAN. The ESSID of the mobile device must match the ESSID of the AP to 
communicate with the AP. The ESSID is a 32-character maximum string and is 
case-sensitive. 
Security FAQ 
1. How do I secure the data across the P-660HW-Tx v2 Access Point's 
radio link? 
To secure the date across the P-660HW-Tx v2 Access Point’s radio link, we 
could select any one of the security mode: 
Static WEP (Wired Equivalency Protocol ) 
WPA-PSK 
WPA 
(Wifi-Protected Access) 
WPA2-PSK 
WPA2 
 
2. What is WEP? 
Wired Equivalent Privacy. WEP is a security mechanism defined within the 
802.11 standard and designed to make the security of the wireless medium 
equal to that of a cable (wire). WEP data encryption was designed to prevent 
access to the network by "intruders" and to prevent the capture of wireless 
LAN traffic through eavesdropping. WEP allows the administrator to define a 
set of respective "Keys" for each wireless network user based on a "Key 
                                     
34 
All contents copyright © 2006 ZyXEL Communications Corporation.