Operation Manual
Chapter 6 Wireless LAN
NBG-418N v2 User’s Guide
63
have the correct settings (SSID, channel, and security). If a wireless client is not allowed to use the
wireless network, it does not matter if it has the correct settings.
This type of security does not protect the information that is sent in the wireless network.
Furthermore, there are ways for unauthorized devices to get the MAC address of an authorized
wireless client. Then, they can use that MAC address to use the wireless network.
6.3.4 Encryption
Wireless networks can use encryption to protect the information that is sent in the wireless
network. Encryption is like a secret code. If you do not know the secret code, you cannot
understand the message.
For example, if users do not log in to the wireless network, you can choose no encryption, WEP,
WPA-PSK, or WPA2-PSK.
Usually, you should set up the strongest encryption that every wireless client in the wireless
network supports. Suppose the wireless network has two wireless clients. Device A only supports
WEP, and device B supports WEP and WPA2-PSK. Therefore, you should set up WEP in the wireless
network.
Note: It is recommended that wireless networks use WPA2-PSK, or stronger encryption.
IEEE 802.1x and WEP encryption are better than none at all, but it is still possible
for unauthorized devices to figure out the original information pretty quickly.
Many types of encryption use a key to protect the information in the wireless network. The longer
the key, the stronger the encryption. Every wireless client in the wireless network must have the
same key.
6.3.5 WPS
WiFi Protected Setup (WPS) is an industry standard specification, defined by the WiFi Alliance. WPS
allows you to quickly set up a wireless network with strong security, without having to configure
security settings manually. Depending on the devices in your network, you can either press a
button (on the device itself, or in its configuration utility) or enter a PIN (Personal Identification
Number) in the devices. Then, they connect and set up a secure network by themselves. See how
to set up a secure wireless network using WPS in the Section 5.3 on page 46.
6.4 General Wireless LAN Screen
Use this screen to enable the Wireless LAN, enter the SSID and select the wireless security mode.
Table 18 Types of Encryption for Each Type of Authentication
NO AUTHENTICATION
Weakest No Security
Static WEP
WPA-PSK
Strongest WPA2-PSK