TRENDnet User’s Guide |
|
|
|
|
|
| |
Wireless Networking and Security |
| Note: WPA2 encryption supports 802.11n speeds and WPA encryption will limit | |||||
| your connection speeds to 54Mbps |
|
| ||||
|
|
|
| ||||
|
| • WPA2: This is the most secure wireless encryption available today, similar to WPA | |||||
How to choose the type of security for your wireless network |
| encryption but more robust. This encryption standard also supports the highest | |||||
Setting up wireless security is very important. Leaving your wireless network open and |
| connection speeds. TRENDnet recommends setting your router to this encryption | |||||
| standard. If you find that one of your wireless network devices does not support | ||||||
unsecure could expose your entire network and personal files to outsiders. TRENDnet |
| ||||||
| WPA2 encryption, then set your router to either WPA or | ||||||
recommends reading through this entire section and setting up wireless security on your |
| ||||||
| Note: Check the specifications of your wireless network adapters and wireless | ||||||
new router. |
| ||||||
| appliances to verify the highest level of encryption supported.Below is brief | ||||||
There are a few different wireless security types supported in wireless networking each |
| ||||||
| comparison chart of the wireless security types and the recommended | ||||||
having its own characteristics which may be more suitable for your wireless network |
| ||||||
| configuration depending on which type you choose for your wireless network. | ||||||
taking into consideration compatibility, performance, as well as the security strength |
| ||||||
|
|
|
|
|
|
| |
along with using older wireless networking hardware (also called legacy hardware). |
|
|
|
|
|
|
|
It is strongly recommended to enable wireless security to prevent unwanted users from |
|
|
|
|
|
|
|
| Security Standard | WEP |
| WPA | WPA2 | ||
accessing your network and network resources (personal documents, media, etc.). |
|
| |||||
|
|
|
|
| IEEE 802.11a/b/g |
| |
In general, it is recommended that you choose the security type with the highest |
|
|
|
|
|
| |
|
|
| IEEE 802.11a/b/g |
| (802.11n devices |
| |
strength and performance supported by the wireless computers and devices in your |
|
|
|
|
| ||
|
|
| (802.11n devices |
| will operate at |
| |
network. Please review the security types to determine which one you should use for |
| Compatible |
|
|
| ||
|
| will operate at |
| 802.11g to connect |
| ||
your network. |
|
|
|
| |||
| Wireless |
| 802.11g to connect |
| using this |
| |
|
|
|
|
| |||
Wireless Encryption Types |
| Standards |
| using this standard) |
| standard) | IEEE 802.11a/b/g/n |
| Highest |
|
|
|
|
| |
• WEP: Legacy encryption method supported by older 802.11b/g hardware. This is |
|
|
|
|
|
| |
| Performance |
|
|
|
| Up to 450Mbps (11n) | |
the oldest and least secure type of wireless encryption. It is generally not |
|
|
|
|
| ||
| Under This |
|
|
|
| and up to 1.3Gbps | |
recommended to use this encryption standard, however if you have old 802.11 b or |
|
|
|
|
| ||
| Setting |
| Up to 54Mbps |
| Up to 54Mbps | (11ac)* | |
802.11g wireless adapters or computers with old embedded wireless cards(wireless |
|
|
| ||||
| Encryption |
|
|
|
|
| |
clients), you may have to set your router to WEP to allow the old adapters to |
|
|
|
|
|
| |
| Strength |
| Low |
| Medium | High | |
connect to the router. |
|
|
| ||||
|
|
| Open System or |
|
|
| |
Note: This encryption standard will limit connection speeds to 54Mbps. |
| Additional |
| TKIP or AES, | TKIP or AES, | ||
| Shared Key, |
| |||||
• WPA: This encryption is significantly more robust than the WEP technology. Much |
|
| Preshared Key or | Preshared Key or | |||
| Options | HEX or ASCII, |
| ||||
of the older 802.11g hardware was been upgraded (with firmware/driver upgrades) |
|
| RADIUS | RADIUS | |||
|
|
| Different key sizes |
| |||
to support this encryption standard. Total wireless speeds under this encryption |
|
|
|
|
|
| |
|
|
|
|
| TKIP | AES | |
type however are limited to 54Mbps. |
| Recommended | Open System ASCII |
| |||
|
| Preshared Key | Preshared Key | ||||
• |
| Configuration | 13 characters |
| |||
|
| ||||||
devices using either WPA or WPA2 encryption. Your wireless network will |
|
|
|
|
| ||
|
|
|
|
|
|
| |
automatically change the encryption setting based on the first wireless device |
| *Dependent on the maximum 802.11n/ac data rate supported by the device (150Mbps, | |||||
connected. For example, if the first wireless client that connects to your wireless |
| ||||||
| 300Mbps, 450Mbps, 867Mbps, or 1.3Gbps) |
|
| ||||
network uses WPA encryption your wireless network will use WPA encryption. Only |
|
|
| ||||
|
|
|
|
|
|
| |
when all wireless clients disconnect to the network and a wireless client with WPA2 |
|
|
|
|
|
|
|
encryption connects your wireless network will then change to WPA2 encryption. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
© Copyright 2013 TRENDnet. All Rights Reserved. |
|
|
|
|
|
| 15 |
|
|
|
|
|
|
|