ZyXEL Communications Corporation IX280P 사용자 설명서

다운로드
페이지 150
Chapter 6 The WIFI Configuration Screen
MAX-207HW2R User’s Guide
58
Security
Security stops unauthorized devices from using the wireless network. It can also 
protect the information that is sent in the wireless network.Use the strongest 
security that every wireless client in the wireless network supports.
Note: WPA2 or WPA2-PSK security is recommended.
• WPA2-PSK and WPA-PSK do not employ user authentication and are known as 
the personal version of WPA.
• WEP is better than no security, but it is still possible for unauthorized devices to 
figure out the original information pretty quickly.
MAC Filter
Every Ethernet device has a unique MAC (Media Access Control) address. The MAC 
address consists of twelve hexadecimal characters (0-9, and A to F), and it is 
usually written in the following format: “0A:A0:00:BB:CC:DD”. 
The MAC filter controls access to the wireless network. You can use the MAC 
address of each wireless client to allow or deny access to the wireless network.
Finding Out More
• See 
Section 6.5 on page 66
 for advanced technical information on wireless 
networks.
Table 14   Wireless Security Levels
SECURITY 
LEVEL
SECURITY TYPE
Weakest  
Strongest
No Security
MAC Filter
WEP Encryption
IEEE 802.1x EAP with RADIUS Server 
Authentication
WPA-PSK (Wi-Fi Protected Access Pre-Shared 
Key)
WPA (Wi-Fi Protected Access)
WPA-PSK2
WPA2