NETGEAR WNR1000v3h2 User Manual page 22

N150 wireless router
Table of Contents

Advertisement

security methods, click the link to the online document
Appendix B.
Table 1. Wireless Security Options
Security Type
None.
WEP. Wired Equivalent Privacy.
WPA-PSK (TKIP). WPA-PSK standard encryption
with TKIP encryption type.
WPA2-PSK (AES). Wi-Fi Protected Access version 2
with Pre-Shared Key; WPA2-PSK standard
encryption with the AES encryption type.
WPA-PSK (TKIP) + WPA2-PSK (AES). Mixed mode.
Table 2. Other Features That Enhance Security
Security Type
Disable the wireless router radio.
Turn off the broadcast of the wireless network
name SSID.
22 |
Chapter 2: Safeguarding Your Network
N150 Wireless Router User Manual
Wireless Networking Basics
Description
No wireless security. Recommended only for
troubleshooting wireless connectivity. Do not run an
unsecured wireless network unless it is your
intention to provide free Internet access for the
public.
Wired Equivalent Privacy (WEP) data encryption
provides moderate data security. WEP Shared Key
authentication and WEP data encryption can be
defeated by a determined eavesdropper using
publicly available tools.
For more information, see
Configuring WEP Wireless
Security
on page 26.
Wi-Fi Protected Access with Pre-Shared Key
(WPA-PSK and WPA2-PSK) data encryption
provides extremely strong data security, very
effectively blocking eavesdropping. Because WPA
and WPA2 are relatively new standards, older
wireless adapters and devices might not support
them.
For more information, see
Configuring WPA-PSK
and WPA2-PSK Wireless Security
Description
If you disable the wireless router radio, wireless
devices cannot communicate with the router at all.
You might disable this when you are away or when
other users of your network all use wired
connections.
For more information, see
Viewing Advanced
Wireless Settings
on page 29.
If you disable the broadcast of the SSID, only
devices that know the correct SSID can connect.
This nullifies the wireless network discovery feature
of some products such as Windows XP, but your data
is still fully exposed to an intruder using available
wireless eavesdropping tools.
For more information, see
Viewing Advanced
Wireless Settings
on page 29.
in
on page 28.

Advertisement

Table of Contents
loading

Table of Contents