Belkin N1 WIRELESS NOTEBOOK CARD F5D8011 User Manual page 12

N1 wireless notebook card
Hide thumbs Also See for N1 WIRELESS NOTEBOOK CARD F5D8011:
Table of Contents

Advertisement

Using the Belkin Wireless Networking Utility
Note:
When you select a network using encryption, you will first see
the simple security screen. Click the "Advanced" button to see other
security options (below).
18
Using the Belkin Wireless Networking Utility
Wired Equivalent Privacy (WEP)
widely adopted wireless security protocol. Depending on the security
level (64- or 128-bit), the user will be asked to input a 10- or 26-
character hex key. A hex key is a combination of letters, a–f, and
numbers, 0–9.
Wireless Protected Access (WPA)
the wireless security. However, not all wireless cards and adapters
support this technology. Please check your wireless adapter's user
manual to check if it supports WPA. Instead of a hex key, WPA uses
only passphrases, which are much easier to remember.
The following section, intended for the home, home-office, and small-
office user, presents a few different ways to maximize the security of
your wireless network.
At the time of publication, four encryption methods are available:
Encryption Methods:
Name
64-bit Wired
128-bit
Equivalent Privacy
Encryption
Acronym
64-bit WEP
128-bit
Security
Good
Better
Features
Static keys
Static keys
Encryption keys
More secure
based on RC4
than 64-bit
algorithm (typically
WEP using a
40-bit keys)
key length of
104 bits plus
24 additional
bits of system-
generated data
WEP
WEP is a common protocol that adds security to all Wi-Fi-compliant
wireless products. WEP gives wireless networks the equivalent level
of privacy protection as a comparable wired network.
is a less secure, but more
is the new standard in
Wi-Fi
Wi-Fi
Protected
Protected
Access-TKIP
Access 2
WPA-TKIP/
WPA2-AES (or
AES (or just
just WPA2)
WPA)
Best
Best
Dynamic key
Dynamic key
encryption
encryption
and mutual
and mutual
authentication
authentication
TKIP
AES
(Temporal
(Advanced
Key Integrity
Encryption
Protocol)
Standard)
added so
does not
that keys are
cause any
rotated and
throughput
encryption is
loss
strengthened
19
19
1
2
3
4
5
6

Advertisement

Table of Contents
loading

Table of Contents

Save PDF