ZyXEL Communications NWD2705 Computer Drive User Manual


 
NWD2705 User’s Guide 35
CHAPTER 4
ZyXEL Utility: Station Mode
4.1 Overview
This section shows you how to configure your NWD2705 using the ZyXEL utility in Windows.
4.1.1 What You Can Do in This Section
•On the Link Info screen, you can see your current connection details, monitor signal strength
and quality, and more. See Section 4.3 on page 37 for details.
•On the Site Survey screen, you can connect to any available unsecured wireless network in
range of the NWD2705, or open the security settings screen for any secured wireless network in
range. See Section 4.4 on page 39 for details.
•On the Profile screen, you can create, delete and manage your wireless network profiles. See
Section 4.5 on page 43 for details.
•On the Adapter screen, you can select the frequency bands that the NWD2705 uses and enable
WPS to set up a wireless network automatically. See Section 4.6 on page 48 for details.
4.1.2 What You Need to Know
The following terms and concepts may help as you read through this section.
Wired Equivalent Privacy (WEP)
WEP (Wired Equivalent Privacy) encrypts data transmitted between wired and wireless networks to
keep the transmission private. Although one of the original wireless encryption protocols, WEP is
also the weakest. Many people use it strictly to deter unintentional usage of their wireless network
by outsiders.
Wi-Fi Protected Access (WPA)
Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. It improves data encryption
by using Temporal Key Integrity Protocol (TKIP), Message Integrity Check (MIC) and IEEE 802.1x.
WPA uses Advanced Encryption Standard (AES) in the Counter mode with Cipher block chaining
Message authentication code Protocol (CCMP) to offer stronger encryption than TKIP. WPA applies
IEEE 802.1x and Extensible Authentication Protocol (EAP) to authenticate wireless clients using an
external RADIUS database. The WPA protocol affords users with vastly stronger security than the
WEP protocol. It comes in two different varieties: WPA and WPA2. Always try to use WPA2 as it
implements the full version of the security standard while WPA does not.