Belkin F5D9000 User Manual page 27

Wireless g plus mimo desktop card
Hide thumbs Also See for F5D9000:
Table of Contents

Advertisement

Available languages
  • EN

Available languages

  • ENGLISH, page 1
Using the Belkin Wireless Networking Utility
Wireless Protected Access (WPA)
wireless security. However, not all wireless cards and adapters support
this technology. Please check your wireless router's user manual to check
if it supports WPA. Instead of a hex key, WPA uses only passphrases,
which are much easier to remember.
The following section, intended for the home, home office, and small
office user, presents a few different ways to maximize the security of your
wireless network.
At the time of publication, four Encryption Methods are available:
Encryption Methods:
Using the Belkin Wireless Networking Utility
Name
64-Bit Wired
Equivalent
Privacy
Acronym
64-bit WEP
Security
Good
Features
Static keys
Encryption
keys based on
RC4 algorithm
(typically 40-bit
keys)
WEP (Wired Equivalent Privacy)
WEP
is a common protocol that adds security to all Wi-Fi-compliant
wireless products. WEP gives wireless networks the equivalent level of
privacy protection as a comparable wired network.
64-Bit WEP
64-bit WEP was first introduced with 64-bit encryption, which includes
a key length of 40 bits plus 24 additional bits of system-generated data
(64 bits total). Some hardware manufacturers refer to 64-bit as 40-bit
encryption. Shortly after the technology was introduced, researchers found
that 64-bit encryption was too easy to decode.
is the new standard in the
128-Bit
Wi-Fi Protected
Encryption
Access
128-bit
WPA-TKIP/AES
Better
Best
Static keys
Dynamic key
encryption
and mutual
authentication
Added security
TKIP (Temporal
over 64-bit
Key Integrity
WEP using a
Protocol) added
key length of
so that keys
104 bits, plus
are rotated and
24 additional
encryption is
bits of system-
strengthened
generated data
25
25
1
2
3
4
5
6
Wi-Fi
Protected
Access 2
WPA2-AES
Best
Dynamic key
encryption
and mutual
authentication
AES
(Advanced
Encryption
Standard)
does not
cause any
throughput
loss

Advertisement

Table of Contents
loading

This manual is also suitable for:

F5d9000v3

Table of Contents