Setting up your wireless network adapter | 13 |
Note: When you select a network using encryption, you will first see the simple security screen. Click the Advanced button to see other security options (below).
Wireless Equivalent Privacy (WEP) is a less secure, but more widely adopted wireless security protocol. Depending on the security level (64- or
The following section, intended for the home, home office, and small office user, presents a few different ways to maximize the security of your wireless network.
Currently, there are four encryption methods available:
| ||||
| Equivalent | Equivalent | ||
| Access 2 | |||
| Privacy | Privacy | ||
|
|
| ||
|
|
|
|
|
Acronym | ||||
|
|
| WPA) | WPA2) |
Security | Good | Better | Best | Best |
|
|
|
|
|
| Static keys | Static keys | Dynamic key | Dynamic key |
Features |
|
| encryption and | encryption and |
|
| mutual | mutual | |
|
|
| ||
|
|
| authentication | authentication |
|
|
|
|
|