Linksys WCG200 - Wireless-G Cable Gateway Wireless Router User Manual page 58

2.4ghz wireless-g cable gateway
Hide thumbs Also See for WCG200 - Wireless-G Cable Gateway Wireless Router:
Table of Contents

Advertisement

Wireless-G Cable Gateway
with dynamic encryption keys, while WPA2-Enterprise only uses AES encryption. RADIUS (Remote Authentication
Dial-In User Service) utilizes a RADIUS server for authentication.
WPA-Personal. If you do not have a RADIUS server, select the type of algorithm you want to use, TKIP or AES,
and enter a password in the Passphrase field of 8-63 characters.
WPA2-Personal. Enter a password in the Passphrase field of 8-63 characters.
WPA-Enterprise. WPA used in coordination with a RADIUS server. (This should only be used when a RADIUS
server is connected to the Router or other device.) WPA-Enterprise offers two encryption methods, TKIP and
AES, with dynamic encryption keys. Enter the RADIUS server's IP Address and port number, along with a key
shared between the device and the server. Last, enter a Group Key Renewal period, which instructs the device
how often it should change the encryption keys.
WPA2-Enterprise. WPA2 used in coordination with a RADIUS server. (This should only be used when a
RADIUS server is connected to the Router or other device.) WPA-Enterprise offers two encryption methods,
AES and TKIP + AES, with dynamic encryption keys. Enter the RADIUS server's IP Address and port number,
along with a key shared between the device and the server. Last, enter a Group Key Renewal period, which
instructs the device how often it should change the encryption keys.
RADIUS. WEP used in coordination with a RADIUS server. (This should only be used when a RADIUS server is
connected to the Router or other device.) First, enter the RADIUS server's IP Address and port number, along
with a key shared between the device and the server. Then, select a WEP key and a level of WEP encryption,
and either generate a WEP key through the Passphrase or enter the WEP key manually.
Implementing encryption may have a negative impact on your network's performance, but if you are transmitting
sensitive data over your network, encryption should be used.
These security recommendations should help keep your mind at ease while you are enjoying the most flexible
and convenient technology Linksys has to offer.
Appendix B: Wireless Security
Security Threats Facing Wireless Networks
52

Advertisement

Table of Contents
loading

Table of Contents