Chapter 4: Web Configuration
Security
To configure security features for the Wireless interface, please open Security item from Wireless menu. This web page offers four authentication protocols for you to secure your data while connecting to networks. There are four selections including None WPA, 802.1X,WPA, and
For None WPA
|
|
offers you the less protection for wireless |
|
communication. |
|
Authentication Type: |
|
The ADSL Router supports two |
|
authentication types: Open System and |
|
Shared key. This should be considered with |
|
the WEP (Wired Equivalent Privacy) |
|
mechanism. |
|
|
|
Open System means that it allows any |
|
client to authenticate and attempt to |
|
communicate with a bridge. The client |
|
can only communicate if its WEP keys |
|
match the router’s WEP keys. | For Open System (or Shared Key), |
| |
Shared Key means that a bridge or |
|
router will send an unencrypted text |
|
string to any client attempting to |
|
communicate with the router. The client |
|
requesting authentication encrypts the |
|
text and sends back to the router. Both |
|
unencrypted and encrypted can be |
|
monitored, yet it leaves the bridge |
|
open to attack from any intruder if he |
|
calculates the WEP key by comparing |
|
the text strings That is why shared key |
|
authentication can be less secure than |
|
open authentication. |
|
Data encryption (WEP): |
|
Select the WEP mode for the WEP key |
|
function. You can choose |
|
for your necessity. If you choose Off, the |
|
Encryption Keys will not be shown on this |
|
page. If selected, data is encrypted using the |
|
key before being transmitted. For example, if |
|
53