796882
174
Zoom out
Zoom in
Previous page
1/434
Next page
Chapter 7 Wireless
VMG/XMG Series User’s Guide
174
This type of security does not protect the information that is sent in the wireless network. Furthermore,
there are ways for unauthorized wireless devices to get the MAC address of an authorized device. Then,
they can use that MAC address to use the wireless network.
7.11.3.3 User Authentication
Authentication is the process of verifying whether a wireless device is allowed to use the wireless
network. You can make every user log in to the wireless network before using it. However, every device
in the wireless network has to support IEEE 802.1x to do this.
For wireless networks, you can store the user names and passwords for each user in a RADIUS server. This
is a server used in businesses more than in homes. If you do not have a RADIUS server, you cannot set up
user names and passwords for your users.
Unauthorized wireless devices can still see the information that is sent in the wireless network, even if they
cannot use the wireless network. Furthermore, there are ways for unauthorized wireless users to get a
valid user name and password. Then, they can use that user name and password to use the wireless
network.
7.11.3.4 Encryption
Wireless networks can use encryption to protect the information that is sent in the wireless network.
Encryption is like a secret code. If you do not know the secret code, you cannot understand the
message.
The types of encryption you can choose depend on the type of authentication. (See Section 7.11.3.3 on
page 174 for information about this.)
For example, if the wireless network has a RADIUS server, you can choose WPA or WPA2. If users do not
log in to the wireless network, you can choose no encryption, WPA-PSK, or WPA2-PSK.
Note: It is recommended that wireless networks use WPA-PSK, WPA, or stronger encryption.
The other types of encryption are better than none at all, but it is still possible for
unauthorized wireless devices to figure out the original information pretty quickly.
Many types of encryption use a key to protect the information in the wireless network. The longer the
key, the stronger the encryption. Every device in the wireless network must have the same key.
7.11.4 Signal Problems
Because wireless networks are radio networks, their signals are subject to limitations of distance,
interference and absorption.
Table 51 Types of Encryption for Each Type of Authentication
NO AUTHENTICATION RADIUS SERVER
Weakest No Security WPA
WPA2
WPA-PSK
Strongest WPA2-PSK
174


Need help? Post your question in this forum.

Forumrules


Report abuse

Libble takes abuse of its services very seriously. We're committed to dealing with such abuse according to the laws in your country of residence. When you submit a report, we'll investigate it and take the appropriate action. We'll get back to you only if we require additional details or have more information to share.

Product:

For example, Anti-Semitic content, racist content, or material that could result in a violent physical act.

For example, a credit card number, a personal identification number, or an unlisted home address. Note that email addresses and full names are not considered private information.

Forumrules

To achieve meaningful questions, we apply the following rules:

Register

Register getting emails for ZyXEL VMG8825-Bx0B at:


You will receive an email to register for one or both of the options.


Get your user manual by e-mail

Enter your email address to receive the manual of ZyXEL VMG8825-Bx0B in the language / languages: English as an attachment in your email.

The manual is 13.81 mb in size.

 

You will receive the manual in your email within minutes. If you have not received an email, then probably have entered the wrong email address or your mailbox is too full. In addition, it may be that your ISP may have a maximum size for emails to receive.

The manual is sent by email. Check your email

If you have not received an email with the manual within fifteen minutes, it may be that you have a entered a wrong email address or that your ISP has set a maximum size to receive email that is smaller than the size of the manual.

The email address you have provided is not correct.

Please check the email address and correct it.

Your question is posted on this page

Would you like to receive an email when new answers and questions are posted? Please enter your email address.



Info