Belkin F5D7050 User Manual - Page 28

Securing your Wireless Network

Page 28 highlights

Securing your Wireless Network Securing your Wireless Network Here are a few different ways to maximize the security of your wireless network and protect your data from unwanted intrusions. This section is intended for the home, home office, and small office user. At the time of publication, three encryption methods are available. Encryption Methods: Name Acronym Security Features 64-bit Wired Equivalent Privacy 128-bit Encryption Wi-Fi Protected Access 64-bit WEP Good Static keys 128-bit Better Static keys WPA Best Dynamic key encryption and mutual authentication Encryption keys based Added security on RC4 algorithm over 64-bit WEP (typically 40-bit keys) using a key length of 104 bits, plus 24 additional bits of system-generated data TKIP (temporal key integrity protocol) added so that keys are rotated and encryption is strengthened 26

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42

26
Securing your Wireless Network
Securing your Wireless Network
Here are a few different ways to maximize the security of your wireless
network and protect your data from unwanted intrusions. This section is
intended for the home, home office, and small office user. At the time of
publication, three encryption methods are available.
Encryption Methods:
Name
64-bit Wired
Equivalent Privacy
128-bit
Encryption
Wi-Fi Protected
Access
Acronym
64-bit WEP
128-bit
WPA
Security
Good
Better
Best
Features
Static keys
Static keys
Dynamic key
encryption and mutual
authentication
Encryption keys based
on RC4 algorithm
(typically 40-bit keys)
Added security
over 64-bit WEP
using a key length
of 104 bits, plus 24
additional bits of
system-generated
data
TKIP (temporal key
integrity protocol)
added so that keys are
rotated and encryption
is strengthened