beautypg.com

3 applications for the zyxel device, 1 protected internet access – ZyXEL Communications P-660HW-T v2 User Manual

Page 37

background image

P-660HW-T v2 User’s Guide

Chapter 1 Getting To Know Your ZyXEL Device

37

Both WPA and WPA2 improve data encryption by using Temporal Key Integrity Protocol
(TKIP), Message Integrity Check (MIC) and IEEE 802.1x. In addition to TKIP, WPA2 also
uses Advanced Encryption Standard (AES) in the Counter mode with Cipher block chaining
Message authentication code Protocol (CCMP) to offer stronger encryption.

Antenna

The ZyXEL Device is equipped with one 3dBi fixed antenna to provide clear radio signal
between the wireless stations and the access points.

WEP Encryption

WEP (Wired Equivalent Privacy) encrypts data frames before transmitting over the wireless
network to help keep network communications private.

Output Power Management

Output power management is the ability to set the level of output power.

There may be interference or difficulty with channel assignment when there is a high density
of APs within a coverage area. In this case you can lower the output power of each access
point, thus enabling you to place access points closer together.

Wireless LAN MAC Address Filtering

Your ZyXEL Device can check the MAC addresses of wireless stations against a list of
allowed or denied MAC addresses.

1.3 Applications for the ZyXEL Device

Here are some example uses for which the ZyXEL Device is well suited.

1.3.1 Protected Internet Access

The ZyXEL Device is the ideal high-speed Internet access solution. It is compatible with all
major ADSL DSLAM (Digital Subscriber Line Access Multiplexer) providers and supports
the ADSL standards as shown in

Table 1 on page 33

. In addition, the ZyXEL Device with the

wireless features allows wireless clients access to your network resources.

The ZyXEL Device provides protection from attacks by Internet hackers. By default, the
firewall blocks all incoming traffic from the WAN. The firewall supports TCP/UDP
inspection and DoS (Denial of Services) detection and prevention, as well as real time alerts,
reports and logs.