Belkin F5D7050_v3 User Manual page 25

Wireless g usb network adapter
Table of Contents

Advertisement

Using the Belkin Wireless Networking Utility
Wired Equivalent Privacy (WEP)
widely adopted, wireless security protocol . Depending on the
security level (64- or 128-bit), the user will be asked to input a 10- or
26-character hex key. A hex key is a combination of letters, a–f, and
numbers, 0–9.
Wireless Protected Access (WPA)
wireless security . However, not all wireless cards and adapters support
this technology . Please check your wireless adapter's user manual
to check if it supports WPA . Instead of a hex key, WPA uses only
passphrases, which are much easier to remember .
The following section, intended for the home, home-office, and small-
office user, presents a few different ways to maximize the security of
your wireless network .
At the time of publication, four encryption methods are available:
Encryption Methods:
Name
64-Bit Wired
Equivalent Privacy
Acronym
64-bit WEP
Security
Good
Features
Static keys
Encryption keys
based on RC4
algorithm (typically
40-bit keys)
is a less secure, but more
is the new standard in the
128-Bit Wired
Wi-Fi
Equivalent
Protected
Privacy
Access-TKIP
128-bit WEP
WPA-TKIP/
AES (or just
WPA)
Better
Best
Static keys
Dynamic key
encryption
and mutual
authentication
More secure
TKIP
than 64-bit
(Temporal
WEP using a
Key Integrity
key length of
Protocol)
104 bits plus
added so
24 additional
that keys are
bits of system-
rotated and
generated data
encryption is
strengthened
23
Wi-Fi
Protected
Access 2
WPA2-AES (or
just WPA2)
Best
Dynamic key
encryption
and mutual
authentication
AES
(Advanced
Encryption
Standard)
does not
cause any
throughput
loss
1
2
3
4
5
6
7

Advertisement

Table of Contents
loading

This manual is also suitable for:

F5d7050_v4F5d7050

Table of Contents