D-Link DCH-M225 User Manual - Page 58

Wireless Security Options, Security Protocols

Page 58 highlights

Appendix C - Wireless Security Wireless Security Options What is the best way to secure your wireless computer network? There are several security protocols with various versions from which to choose. Depending on the wireless device, you may have to select from different levels of security. The description of security protocols, encryption and authentication that follows is intended to help you better understand your choices. Security Protocols WPA ( Wi-Fi Protected Access) and WPA2 (Wi-Fi Protected Access II ) are two security protocols that were developed by the Wi-Fi Alliance (WFA) to replace the less-secure WEP (Wired Equivalent Privacy). The WFA is a trade association that certifies Wi-Fi® products that are compliant with standards of interoperability. IEEE 802.11 is the set of specifications for implementingWLAN (Wireless Local Area Network) computer communication within the 2.4 to 5GHZ frequency bands. WLAN typically provides a connection between wireless devices to the Internet using an AP (access point). WPA was originally referred to as the draft IEEE 802.11i standard, since it became available first, and was intended as an intermediate solution pending the availability of a full IEEE 802.11i standard. WPA2 was known as IEEE 802.11i-2004, the year it first became available. Wi-Fi devices that have been certified since 2006 generally support both WPA and WPA2. WPS (Wi-Fi Protected Setup™) provides the easiest way to establish a secure wireless network for home or small office (SOHO) environments. Introduced in 2007, WPS was created by WFA so that users who might otherwise be intimidated by the available security options could set up a secure network, and later add new devices, with a simple automated process. PBC (Push Button Configuration) requires just the push of a button. Today most wireless devices, from routers to wireless printers and cameras, have a WPS button. WPS enables WPA2 security protocol. D-Link DCH-M225 User Manual 54

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69

54
D-Link DCH-M225 User Manual
Appendix C - Wireless Security
Wireless Security Options
What is the best way to secure your wireless computer network?
There are several security protocols with various versions from
which to choose. Depending on the wireless device, you may have to select from different levels of security.
The description
of security protocols, encryption and authentication that follows is intended to help you better understand your choices.
WPA
( Wi-Fi Protected Access) and
WPA2
(Wi-Fi Protected Access II ) are two security protocols that were developed by the Wi-Fi Alliance (WFA)
to replace the less-secure
WEP
(Wired Equivalent Privacy).
The WFA is a trade association that certifies Wi-Fi® products that are compliant with
standards of interoperability. IEEE 802.11 is the set of specifications for implementing WLAN (Wireless Local Area Network) computer communication
within the 2.4 to 5GHZ frequency bands. WLAN typically provides a connection between wireless devices to the Internet using an AP (access point).
WPA
was originally referred to as the draft IEEE 802.11i standard, since it became available first, and was intended as an intermediate solution
pending the availability of a full IEEE 802.11i standard.
WPA2
was known as IEEE 802.11i-2004, the year it first became available.
Wi-Fi devices that
have been certified since 2006 generally support both
WPA
and
WPA2
.
WPS
(Wi-Fi Protected Setup™) provides the easiest way to establish a secure wireless network for home or small office (SOHO) environments.
Introduced in 2007,
WPS
was created by WFA so that users who might otherwise be intimidated by the available security options could set up a
secure network, and later add new devices, with a simple automated process. PBC (Push Button Configuration) requires just the push of a button.
Today most wireless devices, from routers to wireless printers and cameras, have a
WPS
button.
WPS
enables WPA2 security protocol.
Security Protocols