Belkin F5D8001 User Manual - Page 21

Wired Equivalent Privacy WEP, Wireless Protected Access WPA

Page 21 highlights

section Using the Belkin Wireless Networking Utility Wired Equivalent Privacy (WEP) is a less secure, but more widely 1 adopted wireless security protocol. Depending on the security level (64- 2 or 128-bit), the user will be asked to input a 10- or 26-character hex key. A hex key is a combination of letters, a-f, and numbers, 0-9. Wireless Protected Access (WPA) is the new standard in the 3 wireless security. However, not all wireless cards and adapters support this technology. Please check your wireless adapter's user manual to check if it supports WPA. Instead of a hex key, WPA uses only 4 passphrases, which are much easier to remember. The following section, intended for the home, home-office, and small- 5 office user, presents a few different ways to maximize the security of your wireless network. 6 At the time of publication, four encryption methods are available: Encryption Methods: Name Acronym Security Features 64-bit Wired Equivalent Privacy 64-bit WEP Good Static keys Encryption keys based on RC4 algorithm (typically 40-bit keys) 128-Bit Wired Equivalent Privacy 128-bit WEP Better Static keys More secure than 64-bit WEP using a key length of 104 bits plus 24 additional bits of systemgenerated data Wi-Fi Protected Wi-Fi Protected Access-TKIP Access 2 WPA-TKIP/AES (or just WPA) Best Dynamic key encryption and mutual authentication WPA2-AES (or just WPA2) Best Dynamic key encryption and mutual authentication TKIP (Temporal Key Integrity Protocol) added so that keys are rotated and encryption is strengthened AES (Advanced Encryption Standard) does not cause any throughput loss 19

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252

Using the Belkin Wireless Networking Utility
19
section
1
2
3
4
5
6
Wired Equivalent Privacy (WEP)
is a less secure, but more widely
adopted wireless security protocol. Depending on the security level (64-
or 128-bit), the user will be asked to input a 10- or 26-character hex key.
A hex key is a combination of letters, a–f, and numbers, 0–9.
Wireless Protected Access (WPA)
is the new standard in the
wireless security. However, not all wireless cards and adapters support
this technology. Please check your wireless adapter’s user manual
to check if it supports WPA. Instead of a hex key, WPA uses only
passphrases, which are much easier to remember.
The following section, intended for the home, home-office, and small-
office user, presents a few different ways to maximize the security of
your wireless network.
At the time of publication, four encryption methods are available:
Encryption Methods:
Name
64-bit Wired
Equivalent Privacy
128-Bit Wired
Equivalent
Privacy
Wi-Fi Protected
Access-TKIP
Wi-Fi Protected
Access 2
Acronym
64-bit WEP
128-bit WEP
WPA-TKIP/AES
(or just WPA)
WPA2-AES (or
just WPA2)
Security
Good
Better
Best
Best
Features
Static keys
Static keys
Dynamic key
encryption
and mutual
authentication
Dynamic key
encryption
and mutual
authentication
Encryption keys
based on RC4
algorithm (typically
40-bit keys)
More secure
than 64-bit
WEP using a
key length of
104 bits plus
24 additional
bits of system-
generated data
TKIP (Temporal
Key Integrity
Protocol) added
so that keys
are rotated and
encryption is
strengthened
AES (Advanced
Encryption
Standard) does
not cause any
throughput
loss