User Manual

Table Of Contents
4-7
Setting Up the Access Point
Configuring the Security Settings
Setting Up the Access Point
Configuring the Security Settings
Unlike wired networks, anyone with a compatible wireless card can receive
your wireless data transmissions well beyond your walls. Operating an unse-
cured wireless network creates an opportunity for outsiders to eavesdrop on
your network traffic or to enter your network to access your computers and
files. For this reason, use the security features of your wireless equipment.
Deploy the security features appropriate to your needs.
Figure 4-4. Security Settings Page
Wireless Security Overview
By default, the access point is configured as an “open system,” with no
security. This means that the access point broadcasts a beacon frame adver-
tising each configured wireless network (SSID). If a wireless client has a
configured WLAN of "any," it can read the SSID from the beacon and use it to
allow immediate connection to the access point. Client stations are permitted
to connect with the access point without first verifying that users are autho-
rized to access the network.