
Setting up your wireless card | 13 |
Note: When you select a network using encryption, you will first see the simple security screen. Click the Advanced button to see other security options (below).
Currently, there are four encryption methods available:
| ||||
| Equivalent | Equivalent | ||
| Access 2 | |||
| Privacy | Privacy | ||
|
|
| ||
|
|
|
|
|
Acronym | ||||
|
|
| WPA) | WPA2) |
Security | Good | Better | Best | Best |
|
|
|
|
|
| Static keys | Static keys | Dynamic key | Dynamic key |
Features |
|
| encryption and | encryption and |
|
| mutual | mutual | |
|
|
| ||
|
|
| authentication | authentication |
|
|
|
|
|
| Encryption keys based | More secure than | TKIP (Temporal Key | AES (Advanced |
| on RC4 algorithm | Integrity Protocol) | Encryption Standard) | |
| (typically | key length of 104 bits | added so that keys are | does not cause any |
|
| plus 24 additional bits | rotated and | throughput loss |
|
| of system generated | encryption is |
|
|
| data | strengthened |
|
|
|
|
|
|
WEP
WEP is a common protocol that adds security to all