Linksys WRT54G3G-VN manual Wireless-G Router for Mobile Broadband

Models: WRT54G3G-VN

1 92
Download 92 pages 16.75 Kb
Page 73
Image 73

Wireless-G Router for Mobile Broadband

provide protection against hackers, and AES (Advanced Encryption System), which utilizes a symmetric 128-Bit block data encryption. (AES is stronger than TKIP.) WPA2 uses TKIP + AES for encryption.

WPA Enterprise and WPA2 Enterprise use a RADIUS (Remote Authentication Dial-In User Service) server for authentication. RADIUS uses a RADIUS server and WEP encryption.

WPA Personal. Select the type of algorithm, TKIP or AES, and enter a password in the Passphrase field of

8-63 characters. Enter a Group Key Renewal period time between 0 and 99,999 seconds, which instructs the Router or other device how often it should change the encryption keys.

WPA2 Personal. WPA2 uses TKIP + AES, with dynamic encryption keys. Enter a Passphrase of 8-63 characters. Then enter a Group Key Renewal period, which instructs the Router or other device how often it should change the encryption keys.

WPA Enterprise. This method is WPA used in coordination with a RADIUS server. Enter the IP address and port number of the RADIUS server. Then enter the key shared between the Router and its RADIUS server. Then enter a Key Renewal Timeout period, which instructs the Router or other device how often it should change the encryption keys.

WPA2 Enterprise. This method is WPA2 used in coordination with a RADIUS server. Enter the IP address and port number of the RADIUS server. Then enter the key shared between the Router and its RADIUS server. Then enter a Key Renewal Timeout period, which instructs the Router or other device how often it should change the encryption keys.

RADIUS. This method is WEP used in coordination with a RADIUS server. Enter the IP address and port number of the RADIUS server. Then enter the key shared between the Gateway and its RADIUS server. Enter the WEP settings.

Implementing encryption may have a negative impact on your network’s performance, but if you are transmitting sensitive data over your network, encryption should be used.

These security recommendations should help keep your mind at ease while you are enjoying the most flexible and convenient technology.

Appendix B: Wireless Security

66

Security Threats Facing Wireless Networks

Page 73
Image 73
Linksys WRT54G3G-VN manual Wireless-G Router for Mobile Broadband