Belkin Wireless G User Manual page 20

Desktop card
Hide thumbs Also See for Wireless G:
Table of Contents

Advertisement

Using the Belkin Wireless Networking Utility
security level (64- or 128-bit), the user will be asked to input a 10- or
26-character hex key. A hex key is a combination of letters, a–f, and
numbers, 0–9.
Wireless Protected Access (WPA)
the wireless security. However, not all wireless cards and adapters
support this technology. Please check your wireless adapter's user
manual to check if it supports WPA. Instead of a hex key, WPA uses
only passphrases, which are much easier to remember.
The following section, intended for the home, home office, and small
office user, presents a few different ways to maximize the security of
your wireless network.
At the time of publication, four Encryption Methods are available:
Encryption Methods:
Using the Belkin Wireless Networking Utility
WEP (Wired Equivalent Privacy)
Name
64-Bit Wired
Equivalent
Privacy
Acronym
64-bit WEP
Security
Good
Features
Static keys
Encryption
keys based on
RC4 algorithm
(typically 40-bit
keys)
WEP
is a common protocol that adds security to all Wi-Fi-compliant
wireless products. WEP gives wireless networks the equivalent level
of privacy protection as a comparable wired network.
is the new standard in
128-Bit
Wi-Fi Protected
Encryption
Access
128-bit
WPA-TKIP/AES
Better
Best
Static keys
Dynamic key
encryption
and mutual
authentication
Added security
TKIP (Temporal
over 64-bit
Key Integrity
WEP using a
Protocol) added
key length of
so that keys
104 bits, plus
are rotated and
24 additional
encryption is
bits of system-
strengthened
generated data
17
17
Wi-Fi
Protected
Access 2
WPA2-AES
Best
Dynamic key
encryption
and mutual
authentication
AES
(Advanced
Encryption
Standard)
does not
cause any
throughput
loss
1
2
3
4
5
6

Advertisement

Table of Contents
loading

Table of Contents