Vigor2700Ge/e Userโ€™s Guide
56
factors, including volume of network traffic, network overhead and building materials). Hence,
you can finally smoothly enjoy stream music and video.
3
3.
.8
8.
.1
1
B
Ba
as
si
ic
c
C
Co
on
nc
ce
ep
pt
t
In an Infrastructure Mode of wireless network, Vigor wireless router plays a role as an Access
Point (AP) connecting to lots of wireless clients or Stations (STA). All the STAs will share the
same Internet connection with other wired hosts via Vigor wireless router. The General
Settings will set up the information of this wireless network, including its SSID as
identification, located channel etc.
Real-time Hardware Encryption
Vigor Router is equipped with a hardware AES encryption engine so it can apply highest
protection to your data without influencing user experience.
Complete Security Standard Selection
To ensure the security and privacy of your wireless communication, we provide several
prevailing standards on market.
๎€ WEP (Wireless Equivalent Privacy) is a legacy method to encrypt each frame transmitted
via radio using either a 64-bit or128-bit key. Usually access point will preset a set of four
keys and it will communicate with each station using only one out of the four keys.
๎€ Wi-Fi Protected Access, the most dominating security mechanism in industry, is
separated into two categories: WPA-personal or called WPA Pre-Share Key (WPA/PSK),
and WPA-Enterprise or called WPA/802.1x.
๎€ In WPA-Personal, a pre-defined key is used for encryption during data transmission.
WPA applies Temporal Key Integrity Protocol (TKIP) for data encryption while WPA2
applies AES. The WPA-Enterprise combines not only encryption but also authentication.
Since WEP has been proved vulnerable, you may consider using WPA for the most
secure connection. You should select the appropriate security mechanism according to
your needs.
No matter which security suite you select, they all will enhance the over-the-air data
protection and /or privacy on your wireless networks. The Vigor wireless router is very
flexible and can support multiple secure connections with both WEP and WPA at the same
time. Below shows three examples for your reference.