D-Link DWR-978 Product Manual - Page 84

Wireless Security, What is WPA

Page 84 highlights

Appendix B - Networking Basics Wireless Security This section will show you the different levels of security you can use to help protect your data from intruders. The DWR-978 offers the following types of security: • WPA2 (Wi-Fi Protected Access 2) • WPA (Wi-Fi Protected Access) • WPA2-PSK (Pre-Shared Key) • WPA-PSK (Pre-Shared Key) What is WPA? WPA (Wi-Fi Protected Access), is a Wi-Fi standard that was designed to improve the security features of WEP (Wired Equivalent Privacy). The 2 major improvements over WEP: • Improved data encryption through the Temporal Key Integrity Protocol (TKIP). TKIP scrambles the keys using a hashing algorithm and by adding an integrity-checking feature. WPA2 is based on 802.11i and uses Advanced Encryption Standard (AES) instead of TKIP. • User authentication, which is generally missing in WEP, which is encorporated through the extensible authentication protocol (EAP). WEP regulates access to a wireless network based on a computer's hardware-specific MAC address, which is relatively simple to be sniffed out and stolen. EAP is built on a stronger public-key encryption system so that only authorized network users should be able to access the network. WPA-PSK/WPA2-PSK uses a passphrase or key to authenticate your wireless connection. The key is an alpha-numeric password between 8 and 63 characters long. The password can include symbols (!?*&_) and spaces. This key must be the exact same key entered on your wireless router or access point. This is the technique typically used on home networks. WPA/WPA2 incorporates user authentication through the Extensible Authentication Protocol (EAP). EAP is built on an even stronger key encryption system to make it much more difficult for unauthorized network users to access the network. EAP is often used in corporate or university environments. D-Link DWR-978 User Manual 80

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88

80
D-Link DWR-978 User Manual
Appendix B - Networking Basics
Wireless Security
This section will show you the different levels of security you can use to help protect your data from intruders. The DWR-978 offers the
following types of security:
• WPA2 (Wi-Fi Protected Access 2)
• WPA2-PSK (Pre-Shared Key)
• WPA (Wi-Fi Protected Access)
• WPA-PSK (Pre-Shared Key)
What is WPA?
WPA (Wi-Fi Protected Access), is a Wi-Fi standard that was designed to improve the security features of WEP (Wired Equivalent Privacy).
The 2 major improvements over WEP:
• Improved data encryption through the Temporal Key Integrity Protocol (TKIP). TKIP scrambles the keys using a hashing
algorithm and by adding an integrity-checking feature. WPA2 is based on 802.11i and uses Advanced Encryption Standard
(AES) instead of TKIP.
• User authentication, which is generally missing in WEP, which is encorporated through the extensible authentication
protocol (EAP). WEP regulates access to a wireless network based on a computer’s hardware-specific MAC address, which
is relatively simple to be sniffed out and stolen. EAP is built on a stronger public-key encryption system so that only
authorized network users should be able to access the network.
WPA-PSK/WPA2-PSK uses a passphrase or key to authenticate your wireless connection. The key is an alpha-numeric password between
8 and 63 characters long. The password can include symbols (!?*&_) and spaces. This key must be the exact same key entered on your
wireless router or access point. This is the technique typically used on home networks.
WPA/WPA2 incorporates user authentication through the Extensible Authentication Protocol (EAP). EAP is built on an even stronger key
encryption system to make it much more difficult for unauthorized network users to access the network. EAP is often used in corporate
or university environments.