User Guide
Page 88
Chapter 6 Wireless 6.2.3 More Secure (WPA(2)-PSK) The WPA-PSK security mode provides both the ZyXEL Device and the connecting client share a common password in this section. Select More Secure as WPA, WPA2 or even WPA2-PSK. Select WPA-PSK or WPA2-PSK from the Security ...security mode is that WPA-PSK/WPA2-PSK uses a simple common password, instead of the WPA encryption standard. Figure 21 Wireless > General: More Secure: WPA(2)-PSK The following table describes the labels in order to hide them. 88 P-2601HN(L)-F1 Series User's Guide to 63 case-sensitive ASCII characters or 64 ...
Chapter 6 Wireless 6.2.3 More Secure (WPA(2)-PSK) The WPA-PSK security mode provides both the ZyXEL Device and the connecting client share a common password in this section. Select More Secure as WPA, WPA2 or even WPA2-PSK. Select WPA-PSK or WPA2-PSK from the Security ...security mode is that WPA-PSK/WPA2-PSK uses a simple common password, instead of the WPA encryption standard. Figure 21 Wireless > General: More Secure: WPA(2)-PSK The following table describes the labels in order to hide them. 88 P-2601HN(L)-F1 Series User's Guide to 63 case-sensitive ASCII characters or 64 ...
User Guide
Page 98
...value (see below), then wireless devices never have been developed to ensure that only people presenting the right credentials (often a username and password, or a "key" phrase) can steal information or introduce malware (malicious software) intended to the AP at the same time and result...value lower than the ZyXEL Device does, it . If a device uses a different preamble mode than the default value, the wireless devices must get permission to send information to intercept. These security standards do two things. There are given the code key. 98 P-2601HN(L)-F1 Series User's Guide...
...value (see below), then wireless devices never have been developed to ensure that only people presenting the right credentials (often a username and password, or a "key" phrase) can steal information or introduce malware (malicious software) intended to the AP at the same time and result...value lower than the ZyXEL Device does, it . If a device uses a different preamble mode than the default value, the wireless devices must get permission to send information to intercept. These security standards do two things. There are given the code key. 98 P-2601HN(L)-F1 Series User's Guide...
User Guide
Page 99
...an attacker's software to come up in the wireless network. 6.7.2.1 SSID Normally, the ZyXEL Device acts like a beacon and regularly broadcasts the SSID in the area. for example...security at all, but cannot use them properly. P-2601HN(L)-F1 Series User's Guide 99 For example, the WPA-PSK security standard is very secure if you use a long key which...letters - Other security standards are 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, and F. Everybody who should change the default SSID to guess - but can set up with effective security keys, passwords and so on their ...
...an attacker's software to come up in the wireless network. 6.7.2.1 SSID Normally, the ZyXEL Device acts like a beacon and regularly broadcasts the SSID in the area. for example...security at all, but cannot use them properly. P-2601HN(L)-F1 Series User's Guide 99 For example, the WPA-PSK security standard is very secure if you use a long key which...letters - Other security standards are 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, and F. Everybody who should change the default SSID to guess - but can set up with effective security keys, passwords and so on their ...
User Guide
Page 308
...data encryption. WPA2 (IEEE 802.11i) is not necessary to a WLAN. 308 P-2601HN(L)-F1 Series User's Guide The following table is a comparison of the features of the IEEE 802.11i standard. As long as the passwords match, a wireless client will not be used with the RADIUS server. You may ...still configure and store keys, but for public deployment, a simple user name and password pair is more practical. Table 92 Comparison of...
...data encryption. WPA2 (IEEE 802.11i) is not necessary to a WLAN. 308 P-2601HN(L)-F1 Series User's Guide The following table is a comparison of the features of the IEEE 802.11i standard. As long as the passwords match, a wireless client will not be used with the RADIUS server. You may ...still configure and store keys, but for public deployment, a simple user name and password pair is more practical. Table 92 Comparison of...
User Guide
Page 309
... is dropped. The common-password approach makes WPA(2)-PSK susceptible to brute-force password-guessing attacks but it's still an improvement over WEP as it is more difficult to generate unique temporal encryption P-2601HN(L)-F1 Series User's Guide 309 TKIP... uses 128-bit keys that are the same. Appendix D Wireless LANs If the AP or the wireless clients do not support WPA2, just use Advanced Encryption Standard...
... is dropped. The common-password approach makes WPA(2)-PSK susceptible to brute-force password-guessing attacks but it's still an improvement over WEP as it is more difficult to generate unique temporal encryption P-2601HN(L)-F1 Series User's Guide 309 TKIP... uses 128-bit keys that are the same. Appendix D Wireless LANs If the AP or the wireless clients do not support WPA2, just use Advanced Encryption Standard...
User Guide
Page 337
Index Index A AAL5 247 ACK message 196 activation SSID 91 wireless LAN scheduling 97 administrator password 28 ADSL2 compliance 247 ADSL2+ compliance 247 Advanced Encryption Standard, see AES AES 309 alternative subnet mask notation 256 antenna directional 314 gain 313 omni-directional 314 AP (Access Point... 100 RADIUS server 100 automatic logout 28 B backup configuration 229 bandwidth management 135 Basic Service Set, see BSS blinking LEDs 24 broadcast 68 P-2601HN(L)-F1 Series User's Guide BSS 101, 299 example 102 BYE request 196 C CA 167, 307 call forwarding 248 call hold 200 call return 248...
Index Index A AAL5 247 ACK message 196 activation SSID 91 wireless LAN scheduling 97 administrator password 28 ADSL2 compliance 247 ADSL2+ compliance 247 Advanced Encryption Standard, see AES AES 309 alternative subnet mask notation 256 antenna directional 314 gain 313 omni-directional 314 AP (Access Point... 100 RADIUS server 100 automatic logout 28 B backup configuration 229 bandwidth management 135 Basic Service Set, see BSS blinking LEDs 24 broadcast 68 P-2601HN(L)-F1 Series User's Guide BSS 101, 299 example 102 BYE request 196 C CA 167, 307 call forwarding 248 call hold 200 call return 248...