EasyManua.ls Logo

ZyXEL Communications VMG1312-B10A - Signal Problems

ZyXEL Communications VMG1312-B10A
376 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Chapter 7 Wireless
VMG1312-B Series User’s Guide
129
wireless users to get a valid user nam e and password. Then, t hey can use that user nam e and
password t o use the wireless network.
7.10.3.4 Encryption
Wireless net works can use encrypt ion t o protect the inform at ion t hat is sent in the wireless
net work. Encrypt ion is like a secret code. I f you do not know the secret code, you cannot
understand the m essage.
The types of encryption you can choose depend on the t ype of aut hent icat ion. ( See
Sect ion
7.10.3.3 on page 128 for inform ation about this.)
For exam ple, if the wireless network has a RADI US server, you can choose W PA or W PA2 . I f users
do not log in to the wireless net work, you can choose no encrypt ion, St a t ic W EP, W PA- PSK, or
W PA2 - PSK.
Usually, you should set up t he strongest encryption t hat ever y device in t he wireless network
supports. For exam ple, suppose you have a wireless net work wit h t he Device and you do not have
a RADI US server. Therefore, there is no authentication. Suppose t he wireless network has t wo
devices. Device A only supports WEP, and device B supports WEP and WPA. Therefore, you should
set up St at ic W EP in the wireless network.
Note: I t is recom m ended t hat wireless networks use W PA- PSK, W PA, or st ronger
encrypt ion. The other types of encrypt ion are bet t er t han none at all, but it is st ill
possible for unaut horized wireless devices t o figure out the original inform at ion
pretty quickly.
When you select W PA2 or W PA2 - PSK in your Device, you can also select an option (W PA
com patible) to support WPA as well. I n t his case, if som e of the devices support WPA and som e
support WPA2, you should set up W PA2 - PSK or W PA2 (depending on t he type of wireless network
login) and select the W PA com pa t ible option in the Device.
Many types of encryption use a key t o protect the inform ation in the wireless network. The longer
the key, t he stronger t he encrypt ion. Every device in the wireless network m ust have the sam e key.
7.10.4 Signal Problems
Because wireless networks are radio net works, their signals are subj ect t o lim it at ions of distance,
interference and absorpt ion.
Problem s wit h dist ance occur when the t wo radios are t oo far apart . Problem s with int erference
occur when ot her radio waves interrupt the data signal. I nterference m ay com e from other radio
transm issions, such as m ilitary or air t raffic control com m unications, or from m achines that are
Table 29 Types of Encrypt ion for Each Type of Aut hent ication
NO AUTHENTICATION RADIUS SERVER
W eakest No Securit y WPA
St at ic WEP
WPA- PSK
Stron gest WPA2- PSK WPA2

Table of Contents

Other manuals for ZyXEL Communications VMG1312-B10A

Related product manuals