Securing Your Wi-Fi ® Network - Belkin Range Extender/ Access Point User Manual

Wireless g universal range extender/ access point
Table of Contents

Advertisement

Using the Web-Based Advanced User Interface
Using the Web-Based Advanced User Interface
The example below illustrates using Repeater mode to extend the
range of your wireless network. In this example, the WURE is set up
to connect to the wireless router located in another area.
Desktop Card
��������
Note: Laptops can roam or move between the two wireless coverage
areas if the SSID and the parent access point's SSID match.
Securing your Wi-Fi
Here are a few different ways you can maximize the security of
your wireless network and protect your data from prying eyes and
ears. This section is intended for the home, home-office, and small-
office user. At the time of this manual's publication, there are four
encryption methods available.
64-bit Wired
Equivalent
Name
Privacy
��������
Acronym
64-bit WEP
Security
Good
Features
Static keys
Encryption
keys based on
RC4 algorithm
(typically
40-bit keys)
Wireless G
���������������
Wireless G
Router
Network
®
128-bit Wired
Equivalent Privacy
���������������
128-bit WEP
Better
Static keys
More secure than
64-bit WEP using
a key length of
104 bits plus 24
additional bits of
system-generated
data
24
24
Wireless G
Universal Range
Extender
Wireless G
Notebook Card
Wi-Fi Protected
Access-TKIP
WPA-TKIP
Best
Dynamic key
encryption
and mutual
authentication
TKIP (temporal
key integrity
protocol) added
so that keys
are rotated and
encryption is
strengthened
With Protected
Access
WPA2-AES
Best
Dynamic key
encryption
and mutual
authentication
AES (Advanced
Encryption
Standard) does
not cause any
throughput loss

Advertisement

Table of Contents
loading

This manual is also suitable for:

F5d7132D-tk10G universal

Table of Contents