Linksys WIRELESS-G WRT54GS User Manual page 69

2.4ghz wireless-g broadband router with speedbooster
Hide thumbs Also See for WIRELESS-G WRT54GS:
Table of Contents

Advertisement

Wireless-G Broadband Router with SpeedBooster
WPA-Enterprise and WPA2-Enterprise use a RADIUS (Remote Authentication Dial-In User Service) server for
authentication. RADIUS uses a RADIUS server and WEP encryption.
WPA/WPA2-Personal. Select the type of algorithm, TKIP or AES, and enter a password in the WPA Shared
Key field of 8-63 characters. Enter a Key Renewal period time between 0 and 99,999 seconds, which instructs
the Router or other device how often it should change the encryption keys.
WPA/WPA2-Enterprise. This method is WPA or WPA2 used in coordination with a RADIUS server. Enter the IP
address and port number of the RADIUS server. Then enter the key shared between the Router and its RADIUS
server. Then enter a Key Renewal period, which instructs the Router or other device how often it should
change the encryption keys.
RADIUS. This method is WEP used in coordination with a RADIUS server. Enter the IP address and port number of
the RADIUS server. Then enter the key shared between the Router and its RADIUS server. Enter the WEP settings.
Implementing encryption may have a negative impact on your network's performance, but if you are transmitting
sensitive data over your network, encryption should be used.
These security recommendations should help keep your mind at ease while you are enjoying the most flexible
and convenient technology Linksys has to offer.
The maximum performance for wireless is derived from IEEE Standard 802.11 specifications. Actual performance
can vary, including lower wireless network capacity, data throughput rate, range and coverage. Performance
depends on many factors, conditions and variables, including distance from the access point, volume of network
traffic, building materials and construction, operating system used, mix of wireless products used, interference
and other adverse conditions.
Appendix B: Wireless Security
Security Threats Facing Wireless Networks
62

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents