Basic Wireless Security; Wireless Tutorials; Choosing A Security Method - Hitron CVE-30360 User Manual

Up to 400mbps
Hide thumbs Also See for CVE-30360:
Table of Contents

Advertisement

HITRON CVE-30360 USER'S GUIDE
6.1.3

BASIC WIRELESS SECURITY

Radio is inherently an insecure medium, since it can be intercepted by anybody in the
coverage area with a radio receiver. Therefore, a variety of techniques exist in an
attempt to secure it.
These techniques control authentication (identifying who should be allowed to join the
network) and encryption (signal scrambling so that only authenticated users can
decode the transmitted data). The sophistication of each security method varies, as
does its effectiveness.
The CVE-30360 supports the following wireless security protocols (in order of
effectiveness):
Least secure
Most secure
For more information on these security protocols, see
page 74.
6.2

WIRELESS TUTORIALS

This section walks you through some of the more common wireless networking tasks.
NOTE:
For basic wireless network setup, please see the Quick Installation Guide that
came with your CVE-30360.
These tasks include:

Choosing a Security Method

Changing the Wireless Password
Changing the Network Name (SSID)
Hiding the Network
Improving the Wireless Network's Performance
6.2.1
CHOOSING A SECURITY METHOD
The security method that you choose to use for your wireless network depends upon
the security methods supported by the devices on the network (the CVE-30360, your
PC, your laptop, and so on).
Not all devices support the same security methods, so you must find out what
security methods each of the supports, and choose a method that they all support.
No security
WEP
WPA-PSK
WPA2-PSK
on page
71
on page
on page
on page
73
Advanced Wireless Security
72
73
on page
73
71
on
WIRELESS

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents