Dynex DX-wegrtr User Manual (English) - Page 26

Securing your Wi-Fi® Network - access point

Page 26 highlights

26 Setting up your wireless router Using the Broadcast SSID Feature Note: This advanced feature should be employed by advanced users only. For security, you can choose not to broadcast your network's SSID. Doing so will keep your network name hidden from computers that are scanning for the presence of wireless networks. To turn off the broadcast of the SSID, remove the check mark from the box next to Broadcast SSID, then click Apply Changes. The change is immediate. Each computer now needs to be set to connect to your specific SSID; an SSID of ANY will no longer be accepted. Refer to the documentation of your wireless network adapter for information on making this change. Protected Mode Switch-As part of the 802.11g specification, Protected mode ensures proper operation of 802.11g clients and access points when there is heavy 802.11b traffic in the operating environment. When Protected mode is ON, 802.11g scans for other wireless network traffic before it transmits data. Therefore, using this mode in environments with HEAVY 802.11b traffic or interference achieves best performance results. If you are in an environment with very little-or no-other wireless network traffic, your best performance will be achieved with Protected mode OFF. Securing your Wi-Fi® Network Here are a few different ways you can maximize the security of your wireless network and protect your data from prying eyes and ears. This section is intended for the home, home office, and small office user. At the time of this User Manual's publication, there are four encryption methods available. Name 64-Bit Wired Equivalent Privacy 128-Bit Wired Equivalent Privacy Wi-Fi Protected Wi-Fi Protected Access-TKIP Access 2 Acronym 64-bit WEP 128-bit WEP WPA-TKIP/AES (or just WPA2-AES (or just WPA) WPA2) Security Good Better Best Best Static keys Features Static keys Dynamic key encryption and mutual authentication Dynamic key encryption and mutual authentication Encryption keys based More secure than TKIP (Temporal Key AES (Advanced on RC4 algorithm 64-bit WEP using a Integrity Protocol) Encryption Standard) (typically 40-bit keys) key length of 104 bits added so that keys are does not cause any plus 24 additional bits rotated and throughput loss of system generated encryption is data strengthened

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200

26
Setting up your wireless router
Using the Broadcast SSID Feature
Note:
This advanced feature should be employed by advanced users only.
For security, you can choose not to broadcast your network's SSID. Doing so will keep your
network name hidden from computers that are scanning for the presence of wireless
networks. To turn off the broadcast of the SSID, remove the check mark from the box next to
Broadcast SSID
, then click
Apply Changes
. The change is immediate. Each computer now
needs to be set to connect to your specific SSID; an SSID of
ANY
will no longer be accepted.
Refer to the documentation of your wireless network adapter for information on making this
change.
Protected Mode Switch
–As part of the 802.11g specification, Protected mode ensures
proper operation of 802.11g clients and access points when there is heavy 802.11b traffic in
the operating environment. When Protected mode is
ON
, 802.11g scans for other wireless
network traffic before it transmits data. Therefore, using this mode in environments with
HEAVY 802.11b traffic or interference achieves best performance results. If you are in an
environment with very little-or no-other wireless network traffic, your best performance will
be achieved with Protected mode
OFF
.
Securing your Wi-Fi® Network
Here are a few different ways you can maximize the security of your wireless network and
protect your data from prying eyes and ears. This section is intended for the home, home
office, and small office user.
At the time of this User Manual's publication, there are four encryption methods available.
Name
64-Bit Wired
Equivalent
Privacy
128-Bit Wired
Equivalent
Privacy
Wi-Fi Protected
Access-TKIP
Wi-Fi Protected
Access 2
Acronym
64-bit WEP
128-bit WEP
WPA-TKIP/AES (or just
WPA)
WPA2-AES (or just
WPA2)
Security
Good
Better
Best
Best
Features
Static keys
Static keys
Dynamic key
encryption and
mutual
authentication
Dynamic key
encryption and
mutual
authentication
Encryption keys based
on RC4 algorithm
(typically 40-bit keys)
More secure than
64-bit WEP using a
key length of 104 bits
plus 24 additional bits
of system generated
data
TKIP (Temporal Key
Integrity Protocol)
added so that keys are
rotated and
encryption is
strengthened
AES (Advanced
Encryption Standard)
does not cause any
throughput loss