Draytek Vigor2920 Series User Manual page 254

Dual-wan security router
Hide thumbs Also See for Vigor2920 Series:
Table of Contents

Advertisement

M
u
l
t
i
p
l
M
u
l
t
i
p
l
Vigor router supports four SSID settings for wireless connections. Each SSID can be defined
with different name and download/upload rate for selecting by stations connected to the router
wirelessly.
S
e
c
u
r
i
t
S
e
c
u
r
i
t
Real-time Hardware Encryption: Vigor Router is equipped with a hardware AES encryption
engine so it can apply the highest protection to your data without influencing user experience.
Complete Security Standard Selection: To ensure the security and privacy of your wireless
communication, we provide several prevailing standards on market.
WEP (Wired Equivalent Privacy) is a legacy method to encrypt each frame transmitted via
radio using either a 64-bit or 128-bit key. Usually access point will preset a set of four keys
and it will communicate with each station using only one out of the four keys.
WPA (Wi-Fi Protected Access), the most dominating security mechanism in industry, is
separated into two categories: WPA-personal or called WPA Pre-Share Key (WPA/PSK), and
WPA-Enterprise or called WPA/802.1x.
In WPA-Personal, a pre-defined key is used for encryption during data transmission. WPA
applies Temporal Key Integrity Protocol (TKIP) for data encryption while WPA2 applies AES.
The WPA-Enterprise combines not only encryption but also authentication.
Since WEP has been proved vulnerable, you may consider using WPA for the most secure
connection. You should select the appropriate security mechanism according to your needs.
No matter which security suite you select, they all will enhance the over-the-air data
protection and /or privacy on your wireless network. The Vigor wireless router is very flexible
and can support multiple secure connections with both WEP and WPA at the same time.
Separate the Wireless and the Wired LAN- WLAN Isolation enables you to isolate your
wireless LAN from wired LAN for either quarantine or limit access reasons. To isolate means
neither of the parties can access each other. To elaborate an example for business use, you
may set up a wireless LAN for visitors only so they can connect to Internet without hassle of
Vigor2920 Series User's Guide
e
S
S
I
D
s
e
S
S
I
D
s
y
O
v
e
r
v
i
e
w
y
O
v
e
r
v
i
e
w
246

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vigor2920nVigor2920vn

Table of Contents