![](/images/new-backgrounds/1106164/10616423x1.webp)
Using the Belkin Wireless Networking Utility
Note: When you select a network using encryption, you will first see the simple security screen. Click the “Advanced” button to see other security options (below).
Using the Belkin Wireless Networking Utility
Wired Equivalent Privacy (WEP) is a less secure, but more
widely adopted wireless security protocol. Depending on the security level (64- or
Wireless Protected Access (WPA) is the new standard in
the wireless security. However, not all wireless cards and adapters support this technology. Please check your wireless adapter’s user manual to check if it supports WPA. Instead of a hex key, WPA uses only passphrases, which are much easier to remember.
The following section, intended for the home,
At the time of publication, four encryption methods are available: Encryption Methods:
Name | ||||
| Equivalent Privacy | Encryption | Protected | Protected |
|
|
| Access 2 | |
|
|
|
|
|
Acronym | ||||
|
|
| AES (or just | just WPA2) |
|
|
| WPA) |
|
|
|
|
|
|
Security | Good | Better | Best | Best |
|
|
|
|
|
Features | Static keys | Static keys | Dynamic key | Dynamic key |
|
|
| encryption | encryption |
|
|
| and mutual | and mutual |
|
|
| authentication | authentication |
|
|
|
|
|
| Encryption keys | More secure | TKIP | AES |
| based on RC4 | than | (Temporal | (Advanced |
| algorithm (typically | WEP using a | Key Integrity | Encryption |
| key length of | Protocol) | Standard) | |
|
| 104 bits plus | added so | does not |
|
| 24 additional | that keys are | cause any |
|
| bits of system- | rotated and | throughput |
|
| generated data | encryption is | loss |
|
|
| strengthened |
|
|
|
|
|
|
WEP
WEP is a common protocol that adds security to all
1
2
3
4
5
6
section
18 | 19 |