Advanced Administration
WEP is a basic wireless security setting. It is not full proof and may be hacked into by experi- enced hackers. For WEP there are two types of security keys
WPA WiFi Protected Access
WPA is a more advnaced standard of security. WPA2 is a newer version of WPA. WPA gives you a choice of two encryption methods: TKIP (Temporal Key Integrity Protocol) and AES (Advanced Encryption System). You simply enter in a passphrase which will be converted to a valid encryption key that will be used throughout your system. Hawking recommends that WPA be used within your network for tighter security.
Note that implementing encryption may have a slight negative effect on your network’s per- formance.
Common Connection Types
Cable Modems
Type | Details | ISP Data required |
|
|
|
Dynamic | Your IP Address is allocated | Usually, none. |
IP Address | automatically, when you | However, some ISP's may |
| connect to you ISP. | |
| require you to use a particular | |
|
| |
|
| Hostname, Domain name, or |
|
| MAC (physical) address. |
|
|
|
Static (Fixed) | Your ISP allocates a per- | IP Address allocated to you. |
IP Address | manent IP Address to you. | Some ISP's may also require |
|
| |
|
| you to use a particular Host- |
|
| name, Domain name, or MAC |