EasyManua.ls Logo

ZyXEL Communications P-660HN-51 - Page 80

ZyXEL Communications P-660HN-51
310 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Chapter 6 Wireless
P-660HN-51 User’s Guide
80
Because of the damage that can be done by a malicious attacker, it’s not just people who have
sensitive information on their network who should use security. Everybody who uses any wireless network
should ensure that effective security is in place.
A good way to come up with effective security keys, passwords and so on is to use obscure information
that you personally will easily remember, and to enter it in a way that appears random and does not
include real words. For example, if your mother owns a 1970 Dodge Challenger and her favorite movie is
Vanishing Point (which you know was made in 1971) you could use “70dodchal71vanpoi” as your
security key.
The following sections introduce different types of wireless security you can set up in the wireless
network.

Table of Contents

Other manuals for ZyXEL Communications P-660HN-51

Related product manuals