Using the Web-Based Advanced User Interface

The example below illustrates using Repeater mode to extend the range of your wireless network. In this example, the WURE is set up to connect to the wireless router located in another area.

 

Wireless G

 

Universal Range

Wireless G

Extender

 

Desktop Card

Wireless G

 

Notebook Card

�����������������������

Wireless G

Router

Note: Laptops can roam or move between the two wireless coverage areas if the SSID and the parent access point’s SSID match.

Securing your Wi-Fi®Network

Here are a few different ways you can maximize the security of your wireless network and protect your data from prying eyes and ears. This section is intended for the home, home-office, and small- office user. At the time of this manual’s publication, there are four encryption methods available.

 

64-bit Wired

128-bit Wired

Wi-Fi Protected

With Protected

Name

Equivalent

Equivalent Privacy Access-TKIP

Access

Privacy

 

 

 

 

 

 

 

Acronym

64-bit WEP

128-bit WEP

WPA-TKIP

WPA2-AES

Security

Good

Better

Best

Best

 

 

 

Dynamic key

Dynamic key

Features

Static keys

Static keys

encryption

encryption

and mutual

and mutual

 

 

 

 

 

 

authentication

authentication

 

 

More secure than

TKIP (temporal

 

 

Encryption

64-bit WEP using

key integrity

AES (Advanced

 

keys based on

a key length of

protocol) added

Encryption

 

RC4 algorithm

104 bits plus 24

so that keys

Standard) does

 

(typically

additional bits of

are rotated and

not cause any

 

40-bit keys)

system-generated

encryption is

throughput loss

 

 

data

strengthened

 

24

Page 27
Image 27
Belkin Range Extender/ Access Point manual Securing your Wi-FiNetwork, Name