Using the Web-Based Advanced User Interface
Table of Contents | sections | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
Securing your Wi-Fi® Network
Here are a few different ways you can maximize the security of your wireless network and protect your data from prying eyes and ears. This section is intended for the home, home office, and small office user.
At the time of this User Manual’s publication, there are four encryption methods available.
| |||||
Name | Equivalent | Equivalent | |||
Access 2 | |||||
| Privacy | Privacy | |||
|
|
| |||
Acronym | |||||
just WPA) | WPA2) | ||||
|
|
| |||
Security | Good | Better | Best | Best | |
|
|
| Dynamic key | Dynamic key | |
Features | Static keys | Static keys | encryption | encryption | |
and mutual | and mutual | ||||
|
|
| |||
|
|
| authentication | authentication | |
|
| More secure | TKIP (Temporal |
| |
| Encryption | than | AES (Advanced | ||
| WEP using a | Key Integrity | |||
| keys based on | key length of | Protocol) added | Encryption | |
| RC4 algorithm | 104 bits plus | so that keys | Standard) does | |
| (typically | 24 additional | are rotated and | not cause any | |
| keys) | bits of system- | encryption is | throughput loss | |
|
| generated | strengthened |
| |
|
| data |
|
|
Wired Equivalent Privacy (WEP)
WEP is a common protocol that adds security to all
64-Bit WEP
As a result of
Most of the new wireless equipment in the market today supports both
G Wireless Router | 51 |