TRENDnet TEW-811DRU User Manual page 42

Hide thumbs Also See for TEW-811DRU:
Table of Contents

Advertisement

Security Mode
Unless one of these encryption modes is selected, wireless transmissions to and from your
wireless network can be easily intercepted and interpreted by unauthorized users.
WPA-
Both of these options select some variant of Wi-Fi Protected Access (WPA) -- security
standards published by the Wi-Fi Alliance. The WPA Mode further refines the variant that the
router should employ.
WPA Mode: WPA is the older standard; select this option if the clients that will be used with the
router only support the older standard. WPA2 is the newer implementation of the stronger IEEE
802.11i security standard. With the "WPA2" option, the router tries WPA2 first, but falls back to
WPA if the client only supports WPA. With the "WPA2 Only" option, the router associates only
with clients that also support WPA2 security.
Cipher Type: The encryption algorithm used to secure the data communication. TKIP (Temporal
Key Integrity Protocol) provides per-packet key generation and is based on WEP. AES
(Advanced Encryption Standard) is a very secure block based encryption. With the "TKIP and
AES" option, the router negotiates the cipher type with the client, and uses AES when available.
Group Key Update Interval: The amount of time before the group key used for broadcast and
multicast data is changed.
WPA-PSK
This option uses Wi-Fi Protected Access with a Pre-Shared Key (PSK).
Pre-Shared Key: The key is entered as a pass-phrase of up to 63 alphanumeric characters in
ASCII (American Standard Code for Information Interchange) format at both ends of the
wireless connection. It cannot be shorter than eight characters, although for proper security it
needs to be of ample length and should not be a commonly known phrase. This phrase is used
to generate session keys that are unique for each wireless client.
Wireless MAC Filtering
Choose the type of MAC filtering needed.
Turn MAC Filtering Disable: When "Disable" is selected, MAC addresses are not used to
control network access.
Add MAC Filtering Rule
Use this section to add MAC addresses to the list below.
41

Advertisement

Table of Contents
loading

Table of Contents