Manually Configuring your Router
Encryption/Security
Securing your Wi-Fi Network
Here are a few different ways you can maximize the security of your wireless network and protect your data from prying eyes and ears. This section is intended for the home, home office, and small office user. At the time of this User Manual’s publication, there are four encryption methods available.
Name | ||||
| Equivalent | Equivalent | Access 2 | |
| Privacy | Privacy |
|
|
|
|
|
|
|
Acronym |
| |||
|
|
| (or just WPA) | just WPA2) |
|
|
|
|
|
Security | Good | Better | Best | Best |
|
|
|
|
|
Features | Static keys | Static keys | Dynamic key | Dynamic key |
|
|
| encryption | encryption |
|
|
| and mutual | and mutual |
|
|
| authentication | authentication |
|
|
|
|
|
| Encryption | More secure | TKIP (Temporal | AES (Advanced |
| keys based | than | Key Integrity | Encryption |
| on RC4 | WEP using a | Protocol) | Standard) does |
| algorithm | key length of | added so | not cause any |
| (typically 40- | 104 bits plus | that keys are | throughput |
| bit keys) | 24 additional | rotated and | loss |
|
| bits of system- | encryption is |
|
|
| generated data | strengthened |
|
|
|
|
|
|
WEP (Wired Equivalent Privacy)
WEP is a common protocol that adds security to all
64-Bit WEP
1
2
3
4
5
6
7
8
9
10
11
section
37