ZyXEL G-1000 v2 User’s Guide

Note: It is recommended that wireless networks use WPA-PSK, WPA, or stronger encryption. IEEE 802.1x and WEP encryption are better than none at all, but it is still possible for unauthorized wireless devices to figure out the original information pretty quickly.

It is not possible to use WPA-PSK, WPA or stronger encryption with a local user database. In this case, it is better to set up stronger encryption with no authentication than to set up weaker encryption with the local user database.

When you select WPA2 or WPA2-PSKin your G-1000 v2, you can also select an option

(WPA compatible) to support WPA as well. In this case, if some of the devices support WPA and some support WPA2, you should set up WPA2-PSKor WPA2 (depending on the type of wireless network login) and select the WPA compatible option in the G-1000 v2.

Many types of encryption use a key to protect the information in the wireless network. The longer the key, the stronger the encryption. Every device in the wireless network must have the same key.

4.3 Additional Wireless Terms

The following table describes wireless network terms and acronyms used in the G-1000 v2.

Table 15 Additional Wireless Terms

TERM

DESCRIPTION

 

 

Intra-BSS Traffic

This describes communication (through the AP) between two wireless clients

 

within a wireless network. You might disable this kind of communication to

 

enhance security within your wireless network.

RTS/CTS Threshold

In a wireless network which covers a large area, wireless clients are

 

sometimes not aware of each other’s presence. This may cause them to send

 

information to the AP at the same time and result in information colliding and

 

not getting through.

 

By setting this value lower than the default value, the wireless clients must

 

sometimes get permission to send information to the AP. The lower the value,

 

the more often the wireless clients must get permission.

 

If this value is greater than the fragmentation threshold value (see below), then

 

wireless clients never have to get permission to send information to the AP.

Preamble

A preamble affects the timing in your wireless network. There are two

 

preamble modes: long and short. Most wireless clients can detect the AP’s

 

preamble automatically. However, if a wireless client tries to use a different

 

preamble mode than the AP does, it cannot communicate with the AP.

Max. Frame Burst

Enable this to improve the performance of pure IEEE 802.11g and mixed IEEE

 

802.11b/g networks. In pure IEEE 802.11g networks, set this to the maximum

 

value. In mixed networks, the higher the value, the higher the priority of IEEE

 

802.11g traffic.

Fragmentation

A small fragmentation threshold is recommended for busy networks, while a

Threshold

larger threshold provides faster performance if the network is not very busy.

Roaming

If you have two or more APs on your wireless network, you can enable this

 

option so that wireless clients can change locations without having to log in

 

again. This is useful for wireless clients, such as notebooks, that move around

 

a lot.

52

Chapter 4 Wireless LAN