26 | Setting up your wireless router |
Using the Broadcast SSID Feature
Note: This advanced feature should be employed by advanced users only.
For security, you can choose not to broadcast your network's SSID. Doing so will keep your network name hidden from computers that are scanning for the presence of wireless networks. To turn off the broadcast of the SSID, remove the check mark from the box next to Broadcast SSID, then click Apply Changes. The change is immediate. Each computer now needs to be set to connect to your specific SSID; an SSID of ANY will no longer be accepted. Refer to the documentation of your wireless network adapter for information on making this change.
Protected Mode
Securing your Wi-Fi® Network
Here are a few different ways you can maximize the security of your wireless network and protect your data from prying eyes and ears. This section is intended for the home, home office, and small office user.
At the time of this User Manual's publication, there are four encryption methods available.
| |||||
Name | Equivalent | Equivalent | |||
Access 2 | |||||
| Privacy | Privacy | |||
|
|
| |||
|
|
|
|
| |
Acronym | |||||
|
|
| WPA) | WPA2) | |
Security | Good | Better | Best | Best | |
|
|
|
|
| |
| Static keys | Static keys | Dynamic key | Dynamic key | |
Features |
|
| encryption and | encryption and | |
|
| mutual | mutual | ||
|
|
| |||
|
|
| authentication | authentication | |
|
|
|
|
| |
| Encryption keys based | More secure than | TKIP (Temporal Key | AES (Advanced | |
| on RC4 algorithm | Integrity Protocol) | Encryption Standard) | ||
| (typically | key length of 104 bits | added so that keys are | does not cause any | |
|
| plus 24 additional bits | rotated and | throughput loss | |
|
| of system generated | encryption is |
| |
|
| data | strengthened |
| |
|
|
|
|
|