
54 Mbps Wireless Router WGR614v8 User Manual
Basic security options are listed below in order of increasing effectiveness. Other features that affect security are listed in the table that follows this one. For more details on wireless security methods, see the online document “Wireless Networking Basics” in Appendix B.
Table 2-1. Wireless Security Options
Security Type | Description |
|
|
None. | No wireless security. Recommended only for |
| troubleshooting wireless connectivity. Do not run an |
| unsecured wireless network unless it is your |
| intention to provide free Internet access for the |
| public. |
|
|
WEP. Wired Equivalent Privacy. | Wired Equivalent Privacy (WEP) data encryption |
| provides moderate data security. WEP Shared Key |
| authentication and WEP data encryption can be |
| defeated by a determined eavesdropper using |
| publicly available tools. |
| For more information, see “Configuring WEP |
| Wireless Security” on page |
with TKIP encryption type. | PSK and |
extremely strong data security, very effectively | |
blocking eavesdropping. Because WPA and WPA2 | |
with | are relatively new standards, older wireless adapters |
encryption with the AES encryption type. | and devices might not support them. |
For more information, see “Configuring | |
and |
Safeguarding Your Network |