ZyXEL Communications Corporation IX280P 사용자 설명서
Chapter 6 The WIFI Configuration Screen
MAX-207HW2R User’s Guide
58
Security
Security stops unauthorized devices from using the wireless network. It can also
protect the information that is sent in the wireless network.Use the strongest
security that every wireless client in the wireless network supports.
protect the information that is sent in the wireless network.Use the strongest
security that every wireless client in the wireless network supports.
Note: WPA2 or WPA2-PSK security is recommended.
• WPA2-PSK and WPA-PSK do not employ user authentication and are known as
the personal version of WPA.
• WEP is better than no security, but it is still possible for unauthorized devices to
figure out the original information pretty quickly.
MAC Filter
Every Ethernet device has a unique MAC (Media Access Control) address. The MAC
address consists of twelve hexadecimal characters (0-9, and A to F), and it is
usually written in the following format: “0A:A0:00:BB:CC:DD”.
address consists of twelve hexadecimal characters (0-9, and A to F), and it is
usually written in the following format: “0A:A0:00:BB:CC:DD”.
The MAC filter controls access to the wireless network. You can use the MAC
address of each wireless client to allow or deny access to the wireless network.
address of each wireless client to allow or deny access to the wireless network.
Finding Out More
• See
Section 6.5 on page 66
for advanced technical information on wireless
networks.
Table 14 Wireless Security Levels
SECURITY
LEVEL
LEVEL
SECURITY TYPE
Weakest
Strongest
No Security
MAC Filter
WEP Encryption
IEEE 802.1x EAP with RADIUS Server
Authentication
WPA-PSK (Wi-Fi Protected Access Pre-Shared
Key)
WPA (Wi-Fi Protected Access)
WPA-PSK2
WPA2
MAC Filter
WEP Encryption
IEEE 802.1x EAP with RADIUS Server
Authentication
WPA-PSK (Wi-Fi Protected Access Pre-Shared
Key)
WPA (Wi-Fi Protected Access)
WPA-PSK2
WPA2