Using the Belkin Wireless Networking Utility
Wireless Protected Access (WPA) is the new standard in
the wireless security. However, not all wireless cards and adapters support this technology. Please check your wireless adapter’s user manual to check if it supports WPA. Instead of a hex key, WPA uses only passphrases, which are much easier to remember.
The following section, intended for the home, home office, and small office user, presents a few different ways to maximize the security of your wireless network.
At the time of publication, four Encryption Methods are available: Encryption Methods:
Name | ||||
| Equivalent | Encryption | Access | Protected |
| Privacy |
|
| Access 2 |
|
|
|
|
|
Acronym |
|
| ||
|
|
|
|
|
Security | Good | Better | Best | Best |
|
|
|
|
|
Features | Static keys | Static keys | Dynamic key | Dynamic key |
|
|
| encryption | encryption |
|
|
| and mutual | and mutual |
|
|
| authentication | authentication |
| Encryption | Added security | TKIP (Temporal | AES |
| keys based | over | Key Integrity | (Advanced |
| on RC4 | WEP using a | Protocol) added | Encryption |
| algorithm | key length of | so that keys | Standard) |
| (typically | 104 bits, plus | are rotated and | does not |
| 24 additional | encryption is | cause any | |
|
| bits of system- | strengthened | throughput |
|
| generated data |
| loss |
|
|
|
|
|
WEP
WEP is a common protocol that adds security to all
64-Bit WEP
1
2
3
4
5
6
section
21