Guest Network Wireless Security Options - NETGEAR JWNR2000Tv3 User Manual

N300 wireless router
Table of Contents

Advertisement

N300 Wireless Router Model JWNR2000Tv3

Guest Network Wireless Security Options

A security option is the type of security protocol applied to your wireless network. The
security protocol in force encrypts data transmissions and ensures that only trusted devices
receive authorization to connect to your network. Wi-Fi Protected Access (WPA) has several
options including pre-shared key (PSK) encryption.
This section presents an overview of the security options and provides guidance on when to
use which option. It is possible to set up a guest network without wireless security. NETGEAR
does not recommend doing so.
WPA Encryption
WPA encryption is built into all hardware that has the Wi-Fi-certified seal. This seal means
that the product is authorized by the Wi-Fi Alliance (http://www.wi-fi.org/) because it complies
with the worldwide single standard for high-speed wireless local area networking.
WPA uses a password to perform authentication and generate the initial data encryption
keys, then it dynamically varies the encryption key. WPA-PSK uses Temporal Key Integrity
Protocol (TKIP) data encryption, implements most of the IEEE 802.11i standard, and works
with all wireless network interface cards, but not all wireless access points. It is superseded
by WPA2-PSK.
WPA2-PSK is stronger than WPA-PSK. It is advertised to be theoretically indecipherable due
to the greater degree of randomness in encryption keys that it generates. WPA2-PSK gets
higher speed because it is usually implemented through hardware, while WPA-PSK is usually
implemented through software. WPA2-PSK uses a password to authenticate and generate
the initial data encryption keys. Then it dynamically varies the encryption key.
WPS-PSK + WPA2-PSK Mixed Mode can provide broader support for all wireless clients.
WPA2-PSK clients get higher speed and security, and WPA-PSK clients get decent speed
and security.
32

Advertisement

Table of Contents
loading

Table of Contents