Belkin G Plus User Manual page 25

Adsl2+ modem with wireless mimo router
Hide thumbs Also See for G Plus:
Table of Contents

Advertisement

This option gives the best performance but will not allow 802.11b clients to
connect.
5. Protected Mode Switch
As part of the 802.11g specification, Protected mode ensures proper
operation of 802.11g clients and access points when there is heavy
802.11b traffic in the operating environment. When Protected mode
is ON, 802.11g scans for other wireless network traffic before it
transmits data. Therefore, using this mode in environments with
HEAVY 802.11b traffic or interference achieves best performance
results. If you are in an environment with very little—or no—wireless
network traffic, your best performance will be achieved with Protected
mode OFF.
Encryption/Security
Securing your Wi-Fi Network
Here are a few different ways you can maximize the security of your
wireless network and protect your data from prying eyes and ears.
This section is intended for the home, home office, and small office
user. At the time of this User Manual's publication, there are four
encryption methods available.
[Update with the following chart]
Name
64-Bit Wired
Equivalent Privacy
Acronym
64-bit WEP
Security
Good
Features
Static keys
Encryption keys
based on RC4
algorithm (typically
40-bit keys)
.
WEP (Wired Equivalent Privacy)
WEP is a common protocol that adds security to all Wi-Fi-compliant
wireless products. WEP was designed to give wireless networks the
equivalent level of privacy protection as a comparable wired network.
64-Bit WEP
64-bit WEP was first introduced with 64-bit encryption, which includes
a key length of 40 bits plus 24 additional bits of system-generated
data (64 bits total). Some hardware manufacturers refer to 64-bit
as 40-bit encryption. Shortly after the technology was introduced,
researchers found that 64-bit encryption was too easy to decode.
128-Bit WEP
As a result of 64-bit WEP's potential security weaknesses, 128Bit
WEP was developed as a more secure method of encryption. 128-bit
encryption includes a key length of 104 bits plus 24 additional bits of
system-generated data (128 bits total). Some hardware manufacturers
refer to 128-bit as 104-bit encryption.
Most of the new wireless equipment in the market today supports
both 64-bit and 128-bit WEP encryption, but you might have older
equipment that only supports 64-bit WEP. All Belkin wireless products
will support both 64-bit and 128-bit WEP.
Encryption Keys
After selecting either the "64-bit" or "128-bit WEP" encryption mode,
it is critical that you generate an encryption key. If the encryption key
is not consistent throughout the entire wireless network, your wireless
networking devices will be unable to communicate with one another
on your network and you will not be able to successfully communicate
within your network.
You can enter your key by typing in the hex key manually, or you can
type in a passphrase in the "Passphrase" field and click "Generate"
128-Bit Wired Equivalent
Privacy
128-bit WEP
Better
Static keys
More secure than 64-bit WEP
using a key length of 104 bits
plus 24 additional bits of
system-generated data
Wi-Fi Protected Access-TKIP
WPA-TKIP/AES (or just WPA)
Best
Dynamic key encryption and
mutual authentication
TKIP (Temporal Key Integrity
Protocol) added so that keys are
rotated and encryption is
strengthened
Wi-Fi Protected Access 2
WPA2-AES (or just WPA2)
Best
Dynamic key encryption
and mutual authentication
AES (Advanced Encryption
Standard) does not cause
any throughput loss

Advertisement

Table of Contents
loading

This manual is also suitable for:

F5d9630-4

Table of Contents