Chapter 7 Wireless LAN

7.2What You Can Do

Use the General screen (Section 7.4 on page 101) to enable the Wireless LAN, enter the SSID and select the wireless security mode.

Use the MAC Filter screen (Section 7.5 on page 109) to allow or deny wireless stations based on their MAC addresses from connecting to the NBG-460N.

Use the Advanced screen (Section 7.6 on page 111) to enable roaming, allow intra-BSS networking and set the RTS/CTS Threshold.

Use the QoS screen (Section 7.7 on page 111) to set priority levels to services, such as e-mail, VoIP, chat, and so on.

Use the WPS screen (Section 7.8 on page 115) to quickly set up a wireless network with strong security, without having to configure security settings manually.

Use the WPS Station screen (Section 7.9 on page 116) to add a wireless station using WPS.

Use the Scheduling screen (Section 7.10 on page 116) to set the times your wireless LAN is turned on and off.

Use the WDS screen (Section 7.11 on page 118) to set the operating mode of your NBG-460N to AP + Bridge or Bridge Only and establish wireless links with other APs.

7.3What You Should Know

Every wireless network must follow these basic guidelines.

Every wireless client in the same wireless network must use the same SSID.

The SSID is the name of the wireless network. It stands for Service Set IDentity.

If two wireless networks overlap, they should use different channels.

Like radio stations or television channels, each wireless network uses a specific channel, or frequency, to send and receive information.

Every wireless client in the same wireless network must use security compatible with the AP.

Security stops unauthorized devices from using the wireless network. It can also protect the information that is sent in the wireless network.

7.3.1Wireless Security Overview

The following sections introduce different types of wireless security you can set up in the wireless network.

98

NBG-460N User’s Guide

Page 98
Image 98
ZyXEL Communications wireless n gigbit router zyxel What You Can Do, What You Should Know, Wireless Security Overview