TRENDnet User’s Guide
Below is brief comparison chart of the wireless security types and the recommended configuration depending on which type you choose for your wireless network.
Security Standard | WEP | WPA | WPA2 | |
Compatible | IEEE 802.11a/b/g/n | IEEE 802.11a/b/g/n |
| |
(802.11n devices | (802.11n devices |
| ||
Wireless | will operate at | will operate at |
| |
Standards | 802.11g speeds) | 802.11g speeds) | IEEE 802.11a/b/g/n | |
Highest |
|
|
| |
Performance |
|
|
| |
Under This |
|
|
| |
Setting | Up to 54Mbps | Up to 54Mbps | Up to 450Mbps* | |
Encryption |
|
|
| |
Strength | Low | Medium | High | |
Additional | Open System or | TKIP or AES, | TKIP or AES, | |
Shared Key, | ||||
Preshared Key or | Preshared Key or | |||
Options | HEX or ASCII, | |||
RADIUS | RADIUS | |||
| Different key sizes | |||
|
|
| ||
Recommended | Open System ASCII | TKIP | AES | |
Preshared Key | Preshared Key | |||
Configuration | 13 characters | |||
|
|
*Dependent on the maximum 802.11n data rate supported by the device (150Mbps, 300Mbps, or 450Mbps)
TEW-731BR
Secure your wireless network
Wireless > Security
After you have determined which security type to use for your wireless network (see “How to choose the security type for your wireless network” on page 12), you can set up wireless security.
1.Log into your router management page (see “Access your router management page” on page 27).
2.Click on Wireless, and click on Security.
3.Click on the Authentication Type
© Copyright 2012 TRENDnet. All Rights Reserved.
13