Belkin F5D6060 User Manual - Page 23
Encryption, How to Use Encryption
View all Belkin F5D6060 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 23 highlights
wireless networking Encryption For security, the 802.11b standard incorporates a method of "scrambling" the data being sent over the air. This is called WEP (Wired Equivalent Privacy). There are two different levels of WEP: 64-bit encryption and 128-bit encryption. 64-bit encryption is powerful and secure. 128-bit encryption is very powerful and very secure. The reason that two levels, or rates, of encryption exist, is that the encryption process slows down the data speed. The higher the rate of encryption, the slower the data will be transmitted. 64-bit encryption will reduce data rates nearly 30-40 percent where 128-bit encryption will reduce data rates around 50-60 percent. The trade-off is slower performance for higher security. Keep in mind, however, only large file transfers or continuous streaming data are most affected by this. Normal browsing of the Internet, downloading files, and sending and retrieving e-mails are not affected. How to Use Encryption Encryption is fairly easy to understand. Encryption uses what are called "keys" to decode or "unscramble" data. Keys can be made by entering a passphrase (password) or can be entered manually into the system using a series of two-digit numbers (called hexadecimal). In Infrastructure mode, where an access point or wireless router is being used, the access point or wireless router is programmed with an encryption key. For a wireless device to connect to the wireless network, the same encryption key must be programmed into the device. Your Card can be programmed with a key in either the passphrase manner or with the series of two-digit numbers called hexadecimal (or hex). 21