ZyXEL Communications Corporation NWD270N Manual De Usuario

Descargar
Página de 136
NWD-270N User’s Guide
49
C
H A P T E R
   
4  
ZyXEL Utility
4.1  Overview
This section shows you how to configure your NWD-270N using the ZyXEL utility in 
Windows.
"
Some features available in Windows XP or Windows 2000 are not available in 
Windows Vista.
4.1.1  What You Can Do in This Section
• On  the  Link Info screen, you can see your current connection details, monitor signal 
strength and quality, and more. See 
 for details.
• On  the  Site Survey screen, you can connect to any available unsecured wireless network 
in range of the NWD-270N, or open the security settings screen for any secured wireless 
network in range. See 
 for details.\
• On  the  Profile screen, you can create, delete and manage your wireless network profiles. 
See 
 for details.
• On  the  Adapter screen, you can configure the NWD-270N hardware, such as activating 
WPS mode or its power saving feature. See 
 for details.
4.1.2  What You Need to Know
The following terms and concepts may help as you read through this section.
Wired Equivalent Privacy (WEP)
WEP (Wired Equivalent Privacy) encrypts data transmitted between wired and wireless 
networks to keep the transmission private. Although one of the original wireless encryption 
protocols, WEP is also the weakest. Many people use it strictly to deter unintentional usage of 
their wireless network by outsiders.
Wi-fi Protected Access (WPA)
Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. It improves data 
encryption by using Temporal Key Integrity Protocol (TKIP), Message Integrity Check (MIC) 
and IEEE 802.1x. WPA uses Advanced Encryption Standard (AES) in the Counter mode with 
Cipher block chaining Message authentication code Protocol (CCMP) to offer stronger