NETGEAR WNR500 User Manual page 28

N-150 2-port wireless router
Table of Contents

Advertisement

Advanced Wireless Settings. You access these under Advanced in the main menu (see
"Viewing Advanced Wireless Settings" on page
Use Wi-Fi Protected Setup (WPS) to automatically set the SSID and implement WPA/
WPA2 security on both the router and the client device. If the clients in your network are
WPS capable, you can use Wi-Fi Protected Setup (WPS) to automatically set the SSID and
implement WPA/WPA2 security on both the router and the client device (see
WPS Security (Wi-Fi Protected Setup)" on page
Basic security options are listed in order of increasing effectiveness in
that affect security are listed in
methods, click the link to the online document
Table 2-1. Wireless Security Options
Security Type
None.
WEP. Wired Equivalent Privacy.
WPA-PSK (TKIP). WPA-PSK standard encryption
with TKIP encryption type.
WPA2-PSK (AES). Wi-Fi Protected Access version 2
with Pre-Shared Key; WPA2-PSK standard
encryption with the AES encryption type.
WPA-PSK (TKIP) + WPA2-PSK (AES). Mixed mode.
Safeguarding Your Network
N-150 2-Port Wireless Router WNR500 User Manual
2-13).
Table 2-2 on page
2-4. For more details on wireless security
"Wireless Networking Basics" in Appendix
Description
No wireless security. Recommended only for
troubleshooting wireless connectivity. Do not run an
unsecured wireless network unless it is your
intention to provide free Internet access for the
public.
Wired Equivalent Privacy (WEP) data encryption
provides moderate data security. WEP Shared Key
authentication and WEP data encryption can be
defeated by a determined eavesdropper using
publicly available tools.
For more information, see
Wireless Security" on page
Wi-Fi Protected Access with Pre-Shared Key (WPA-
PSK and WPA2-PSK) data encryption provides
extremely strong data security, very effectively
blocking eavesdropping. Because WPA and WPA2
are relatively new standards, older wireless adapters
and devices might not support them.
For more information, see
and WPA2-PSK Wireless Security" on page
v1.0, November 2011
2-12).
Table
2-1. Other features
"Configuring WEP
2-9.
"Configuring WPA-PSK
"Configuring
B.
2-10.
2-3

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents