Belkin F5D7000F User Manual page 22

Wireless g desktop card
Table of Contents

Advertisement

Page 22 of
45
user will be asked to input a 10- or 26-character hex key. A hex key is a
combination of letters, a–f, and numbers, 0–9.
Wireless Protected Access (WPA) is the new standard in the wireless security.
However, not all wireless cards and adapters support this technology. Please
check your wireless adapter's user manual to check if it supports WPA. Instead
of a hex key, WPA uses only passphrases, which are much easier to remember.
The following section, intended for the home, home office, and small office user,
presents a few different ways to maximize the security of your wireless network.
At the time of publication, four Encryption Methods are available:
Encryption Methods:
Using the Belkin Wireless Networking Utility
Name
64-Bit Wired
Equivalent
Privacy
Acronym
64-bit WEP
Security
Good
Features
Static keys
Encryption
keys
based on
RC4
algorithm
(typically
40-bit keys)
WEP (Wired Equivalent Privacy)
WEP is a common protocol that adds security to all Wi-Fi-compliant wireless
products. WEP gives wireless networks the equivalent level of privacy protection
as a comparable wired network.
64-Bit WEP
128-Bit
Wi-Fi
Encryption
Protected
Access
128-bit
WPA-TKIP/AES
Better
Best
Static keys
Dynamic key
encryption
and mutual
authentication
Added
TKIP (Temporal
security
Key Integrity
over 64-bit
Protocol)
WEP using a
added so
key length of
that keys are
104 bits, plus
rotated and
24 additional
encryption is
bits of
strengthened
system-
generated
data
Wi-Fi
Protected
Access 2
WPA2-AES
Best
Dynamic key
encryption
and mutual
authentication
AES
(Advanced
Encryption
Standard)
does not
cause any
throughput
loss

Advertisement

Table of Contents
loading

Table of Contents