Wireless Security Settings
WiFi Protected Access (WPA
This type of encryption helps protect your network from unauthorized access and eavesdroppers. Like WEP, an encryption key scrambles the data between your computers and your Ovation. Like WEP Shared, computers must authenticate with your Ovation to join the network. This is where the similarities end.
With WEP the encryption key is static – it stays the same until you change it. With WPA
again on each computer you want to connect to your network. Then the WPA Temporal Key Integrity Protocol (TKIP) takes over.
TKIP mathematically derives encryption keys based on your initial passphrase. Keys are automatically changed, rotated and authenticated among devices in your network. The same key is never used twice. WPA
referred to as extraength encryption.
What are the drawbacks?
To use WPA
must support WPA. Older devices – those manufactured before August 2003 – might not support this new standard. Check with your manufacturer to see if a software upgrade is available.
Setting up WPA
Your WPA
contain special characters and spaces. Ideally, a passphrase should consist of 20 characters, be a mixture of uppercase and lowercase letters, and contain numbers and punctuation marks.
Since your passphrase provides the starting point for the rekeying process, using a passphrase that is difficult to crack strengthens your network security.
38