ZyXEL Communications Corporation NBG2105 Manuel D’Utilisation

Page de 146
Chapter 13 Wireless LAN
NBG2105 User’s Guide
84
• Use  the  Site Survey screen to scan for and connect to a wireless network automatically. (
)
• Use  the  WPS screen to quickly set up a wireless network with strong security, without having to 
configure security settings manually (
• Use  the  MAC Filtering screen to allow or deny wireless stations based on their MAC addresses 
from connecting to the NBG2105 (
).
13.1.2  What You Should Know
Every wireless network must follow these basic guidelines.
• Every wireless client in the same wireless network must use the same SSID.
The SSID is the name of the wireless network. It stands for Service Set IDentity.
• If two wireless networks overlap, they should use different channels.
Like radio stations or television channels, each wireless network uses a specific channel, or 
frequency, to send and receive information.
• Every wireless client in the same wireless network must use security compatible with the AP.
Security stops unauthorized devices from using the wireless network. It can also protect the 
information that is sent in the wireless network.
Wireless Security Overview
The following sections introduce different types of wireless security you can set up in the wireless 
network.
SSID
Normally, the AP acts like a beacon and regularly broadcasts the SSID in the area. You can hide the 
SSID instead, in which case the AP does not broadcast the SSID. In addition, you should change 
the default SSID to something that is difficult to guess.
This type of security is fairly weak, however, because there are ways for unauthorized devices to 
get the SSID. In addition, unauthorized devices can still see the information that is sent in the 
wireless network.
Authentication
Authentication is the process of confirming a client’s user name and password when they connect to 
a network. Turning off authentication means allowing anyone to connect to the network.
Encryption
Wireless networks can use encryption to protect the information that is sent in the wireless 
network. It is the process of taking data and encoding it, usually using a secret code, so that it 
becomes unreadable unless decrypted with the proper code or pass phrase. If you do not know the 
secret code, you cannot understand the message.