Manually Configuring your Router
Table of Contents | sections | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
Encryption/Security
Securing your Wi-Fi Network
Here are a few different ways you can maximize the security of your wireless network and protect your data from prying eyes and ears. This section is intended for the home,
| |||||
Name | Equivalent | Equivalent | |||
Access 2 | |||||
| Privacy | Privacy | |||
|
|
| |||
|
|
|
|
| |
Acronym |
| ||||
(or just WPA) | just WPA2) | ||||
|
|
| |||
|
|
|
|
| |
Security | Good | Better | Best | Best | |
|
|
|
|
| |
|
|
| Dynamic key | Dynamic key | |
Features | Static keys | Static keys | encryption | encryption | |
and mutual | and mutual | ||||
|
|
| |||
|
|
| authentication | authentication | |
|
|
|
|
| |
|
| More secure | TKIP (Temporal |
| |
| Encryption | than |
| ||
| Key Integrity | AES (Advanced | |||
| WEP using a | ||||
| keys based on | Protocol) added | Encryption | ||
| key length of | ||||
| RC4 algorithm | so that keys | Standard) does | ||
| 104 bits plus | ||||
| (typically | are rotated and | not cause any | ||
| 24 additional | ||||
| encryption is | throughput loss | |||
| bits of system- | ||||
|
| strengthened |
| ||
|
| generated data |
| ||
|
|
|
| ||
|
|
|
|
|
G Wireless Modem Router | 33 |