Using the Web-Based Advanced User Interface
Securing your Wi-Fi® Network
Here are a few different ways you can maximize the security of your wireless network and protect your data from prying eyes and ears. This section is intended for the home, home office, and small office user. At the time of this User Manual’s publication, there are three encryption methods available.
Name | ||||
| Equivalent | Equivalent Privacy |
|
|
| Privacy |
|
|
|
|
|
|
|
|
Acronym |
|
| ||
|
|
|
|
|
Security | Good | Better | Best | Best |
|
|
|
|
|
Features | Static keys | Static keys | Dynamic key | Dynamic key |
|
|
| encryption | encryption |
|
|
| and mutual | and mutual |
|
|
| authentication | authentication |
|
|
|
|
|
| Encryption | More secure | TKIP (temporal | AES (Advanced |
| keys based on | than | key integrity | Encryption |
| RC4 algorithm | WEP using a | protocol) added | Standard) |
| (typically | key length of | so that keys | does not |
| 104 bits plus | are rotated and | cause any | |
|
| 24 additional | encryption is | throughput loss |
|
| bits of system- | strengthened |
|
|
| generated data |
|
|
|
|
|
|
|
WEP (Wired Equivalent Privacy)
WEP (Wired Equivalent Privacy) is a common protocol that adds security to all
64-Bit WEP
1
2
3
4
5
6
7
8
9
10
section
45