Belkin PM01110 user manual Securing your Wi-FiNetwork, Wired Equivalent Privacy WEP, Bit WEP

Page 52

Using the Web-Based Advanced User Interface

Table of Contents

sections

1

2

3

4

5

6

7

8

9

10

Securing your Wi-Fi®Network

Here are a few different ways you can maximize the security of your wireless network and protect your data from prying eyes and ears. This section is intended for the home, home office, and small office user.

At the time of this User Manual’s publication, there are four encryption methods available.

 

64-Bit Wired

128-Bit Wired

Wi-Fi Protected

Wi-Fi Protected

Name

Equivalent

Equivalent

Access-TKIP

Access 2

 

Privacy

Privacy

 

 

 

 

 

 

 

 

Acronym

64-bit WEP

128-bit WEP

WPA-TKIP/AES (or

WPA2-AES (or just

just WPA)

WPA2)

 

 

 

 

 

 

 

 

Security

Good

Better

Best

Best

 

 

 

 

 

 

 

 

Dynamic key

Dynamic key

Features

Static keys

Static keys

encryption

encryption

and mutual

and mutual

 

 

 

 

 

 

authentication

authentication

 

 

 

 

 

 

 

More secure

 

 

 

 

than 64-bit

TKIP (Temporal

 

 

Encryption

WEP using a

Key Integrity

AES (Advanced

 

keys based on

key length of

Protocol) added

Encryption

 

RC4 algorithm

104 bits plus

so that keys

Standard) does

 

(typically

24 additional

are rotated and

not cause any

 

40-bit keys)

bits of system-

encryption is

throughput loss

 

 

generated

strengthened

 

 

 

data

 

 

 

 

 

 

 

Wired Equivalent Privacy (WEP)

WEP is a common protocol that adds security to all Wi-Fi-compliant wireless products. WEP was designed to give wireless networks the equivalent level of privacy protection as a comparable wired network.

64-Bit WEP

64-bit WEP was first introduced with 64-bit encryption, which includes a key length of 40 bits plus 24 additional bits of system-generated data (64 bits total). Some hardware manufacturers refer to 64-bit as 40-bit encryption. Shortly after the technology was introduced, researchers found that 64-bit encryption was too easy to decode.

128-Bit WEP

As a result of 64-bit WEP’s potential security weaknesses, a more secure method of 128-bit encryption was developed. 128-bit encryption includes a key length of 104 bits plus 24 additional bits of system- generated data (128 bits total). Some hardware manufacturers refer to 128-bit as 104-bit encryption.

Most of the new wireless equipment in the market today supports both 64-bit and 128-bit WEP encryption, but you might have older equipment that only supports 64-bit WEP. All Belkin wireless products will support both 64-bit and 128-bit WEP.

G Wireless Router

50

Image 52
Contents Wireless Router Table of Contents Introduction Advantages of a Wireless NetworkBenefits of a Home Network Placement of your Router for Optimal Performance Important Factors for Placement and SetupWireless Router Placement IntroductionChoose the Quietest Channel for your Wireless Network Cordless PhonesSecure Connections, VPNs, and AOL Product Features Product OverviewProduct Overview Package Contents Setup Assistant Software System RequirementsKnowing your Router System RequirementsPower LED Wireless LEDKnowing your Router Modem LEDWired LEDs 1 2 3 Internet LEDPower Jack Connections to Computers Wired Computer Ports GrayReset Button Resetting the RouterConnecting and Configuring your Router Modem RequirementsConnecting and Configuring your Router Hardware ConnectionsSet Up the Router Run the Setup Assistant Software Select Country Confirmation ScreenProgress Screen Checking Settings Verifying Hardware Connections Naming your Wireless Network Connecting and Configuring your Router Configuring the Router Checking Internet Connection Congratulations Troubleshooting Optional Assistance Connecting Other Computers Set Up Wireless Security Run the Security Assistant Software Progress Screen Picking the Security Type Creating a Network Key Transferring the Key Verifying the Connection Congratulations Alternate Setup Method Connect your RouterAlternate Setup Method Alternate Setup Method Logging into the Router Logging out of the Router Using the Web-Based Advanced User Interface Internet Status Indicator Login/Logout ButtonQuick-Navigation Links Home ButtonLAN Settings Name FeaturesInternet Settings Version InfoSetting your Connection Type Change WAN MAC Address Subnet Mask IP AddressISP Gateway Address Setting your ISP Connection Type to PPPoE Password Service Name OptionalUser Name My IP AddressAlternate Setup Method Pptp Account My IP Address Alternate Setup Method L2TP Password L2TP AccountSetting Custom Domain Name Server DNS Settings Cloning your MAC Address Changing LAN Settings Using the Web-Based Advanced User InterfaceViewing the LAN Settings Dhcp Server Using the Web-Based Advanced User InterfaceIP Pool Subnet Mask Lease Time Viewing the Dhcp Client ListLocal Domain Name Configuring the Wireless Network Settings Changing the Wireless Network Name SsidUsing the Wireless Mode Switch B ModeOnly Mode Off ModeChanging the Wireless Channel QoS Quality of Service Configuration Using the Broadcast Ssid FeatureProtected Mode Switch Wired Equivalent Privacy WEP Securing your Wi-FiNetworkBit WEP Encryption Keys Wi-Fi Protected Access WPA Using a Hexadecimal Key Sharing the Same Network KeysAF 0F 4B C3 D4 = 64-bit WEP key Bit WEP Encryption Changing the Wireless Security Settings Using Wi-Fi Protected SetupWPA Setup Setting WPA/WPA2 Guest AccessUsing the Web-Based Advanced User Interface Using the Access Point Mode Wireless Range Extension and Bridging What is a Wireless Bridge?Adding Another Network Segment Wirelessly Range Extension`i\c\jjLe`m\ijXc J\i`XcEf1 IXe\ok\e\i Using the Web-Based Advanced User Interface Configuring the Firewall Configuring Internal Forwarding Settings Using the Web-Based Advanced User Interface Setting MAC Address Filtering Enabling the Demilitarized Zone DMZ Setting up the Router’s Dynamic DNS Ddns Update Client Utilities Tab WAN Ping BlockingRestarting the Router to Restore Normal Operation Restarting the RouterRestoring Factory Default Settings Using the Web-Based Advanced User Interface Saving a Current Configuration Using the Web-Based Advanced User Interface Restoring a Previous Configuration Using the Web-Based Advanced User Interface Updating the Firmware Searching for a New Version of FirmwareDownloading a New Version of Firmware Using the Web-Based Advanced User Interface Updating the Router’s Firmware Using the Web-Based Advanced User Interface Setting or Changing the Administrator Password Changing System SettingsChanging the Login Time-Out Setting Setting the Time and Time Zone Enabling Remote ManagementEnabling/Disabling Auto Firmware Update Enabling/Disabling UPnPManually Configuring Network Settings Manually Configuring Network Settings Manually Configuring Network Adapters in Windows 98SE or MeManually Configuring Network Adapters in Mac OS up to Manually Configuring Network Adapters in Mac OS X Manually Configuring Network Settings Recommended Web Browser Settings Internet Explorer 4.0 or HigherRecommended Web Browser Settings Netscape Navigator 4.0 or HigherProblem TroubleshootingSolution Troubleshooting Setup Assistant cannot find my Router Setup Assistant cannot connect my Router to the Internet Troubleshooting Can’t connect to the Internet wirelessly Troubleshooting Limiting the Wireless Transmit Rate 101 C3 03 0F AF 4B B2 C3 D4 4B C3 D4 E7 E4 = 128-bit key For example C3030FAF4BB2C3D44BC3D4E7E4 = 128-bit key Solution Problem 105 106 Enabling WPA-PSK 108 Information FCC StatementF5D7234-4 Federal Communications Commission NoticeInformation ModificationsEurope-European Union Notice Canada-Industry Canada ICWhat this warranty covers What will we do to correct problems?What is not covered by this warranty? How to get serviceHow state law relates to the warranty 112