26

Setting up your wireless router

Using the Broadcast SSID Feature

Note: This advanced feature should be employed by advanced users only.

For security, you can choose not to broadcast your network's SSID. Doing so will keep your network name hidden from computers that are scanning for the presence of wireless networks. To turn off the broadcast of the SSID, remove the check mark from the box next to Broadcast SSID, then click Apply Changes. The change is immediate. Each computer now needs to be set to connect to your specific SSID; an SSID of ANY will no longer be accepted. Refer to the documentation of your wireless network adapter for information on making this change.

Protected Mode Switch–As part of the 802.11g specification, Protected mode ensures proper operation of 802.11g clients and access points when there is heavy 802.11b traffic in the operating environment. When Protected mode is ON, 802.11g scans for other wireless network traffic before it transmits data. Therefore, using this mode in environments with HEAVY 802.11b traffic or interference achieves best performance results. If you are in an environment with very little-or no-other wireless network traffic, your best performance will be achieved with Protected mode OFF.

Securing your Wi-Fi® Network

Here are a few different ways you can maximize the security of your wireless network and protect your data from prying eyes and ears. This section is intended for the home, home office, and small office user.

At the time of this User Manual's publication, there are four encryption methods available.

 

64-Bit Wired

128-Bit Wired

Wi-Fi Protected

Wi-Fi Protected

Name

Equivalent

Equivalent

Access-TKIP

Access 2

 

Privacy

Privacy

 

 

 

 

 

 

 

 

Acronym

64-bit WEP

128-bit WEP

WPA-TKIP/AES (or just

WPA2-AES (or just

 

 

 

WPA)

WPA2)

Security

Good

Better

Best

Best

 

 

 

 

 

 

Static keys

Static keys

Dynamic key

Dynamic key

Features

 

 

encryption and

encryption and

 

 

mutual

mutual

 

 

 

 

 

 

authentication

authentication

 

 

 

 

 

 

Encryption keys based

More secure than

TKIP (Temporal Key

AES (Advanced

 

on RC4 algorithm

64-bit WEP using a

Integrity Protocol)

Encryption Standard)

 

(typically 40-bit keys)

key length of 104 bits

added so that keys are

does not cause any

 

 

plus 24 additional bits

rotated and

throughput loss

 

 

of system generated

encryption is

 

 

 

data

strengthened