ZyXEL Communications ZyAIR G-220 Manual De Usuario

Descargar
Página de 67
ZyAIR G-220 User’s Guide 
2-4                                                             
 
Wireless Station Mode Configuration 
The following figure depicts a roaming example. When wireless station B moves to position X, the ZyAIR 
in wireless station B automatically switches the channel to the one used by access point 2 in order to stay 
connected to the network. 
 
Figure 2-5 Roaming Example 
2.2 Wireless 
LAN 
Security 
Wireless LAN security is vital to your network to protect wireless communications. 
Configure the wireless LAN security using the More Setting… screen. If you do not enable any wireless 
security on your ZyAIR, the ZyAIR’s wireless communications are accessible to any wireless networking 
device that is in the coverage area. 
2.2.1  Data Encryption with WEP 
WEP (Wired Equivalent Privacy) encryption scrambles all data packets transmitted between the ZyAIR and 
the AP or other wireless stations to keep network communications private. Both the wireless stations and 
the access points must use the same WEP key for data encryption and decryption.  
Your ZyAIR allows you to configure up to four 64-bit, 128-bit or 256-bit WEP keys but only one key can 
be used at any one time. 
2.3 Fragmentation 
Threshold 
Fragmentation Threshold is the maximum data fragment size (between 256 and 2432 bytes) that can be 
sent in the wireless network before the ZyAIR will fragment the packet into smaller data frames.