D-Link R12 User Manual - Page 125

Wireless Security

Page 125 highlights

Appendix D - Wireless Security Wireless Security This section will show you the different levels of security you can use to protect your data from intruders. The router offers the following types of security: • WPA3 (Wi-Fi Protected Access 3) • WPA2-PSK (Pre-Shared Key) • WPA-PSK (Pre-Shared Key) • WPA2 (Wi-Fi Protected Access 2) • WPA (Wi-Fi Protected Access) What is WPA? WPA (Wi-Fi Protected Access), is a Wi-Fi standard that was designed to improve the security features of WEP (Wired Equivalent Privacy). The 2 major improvements over WEP: • Improved data encryption through the Temporal Key Integrity Protocol (TKIP). TKIP scrambles the keys using a hashing algorithm and by adding an integrity-checking feature, ensures that the keys haven't been tampered with. WPA2 is based on 802.11i and uses Advanced Encryption Standard (AES) instead of TKIP. • User authentication, which is generally missing in WEP, through the extensible authentication protocol (EAP). WEP regulates access to a wireless network based on a computer's hardware-specific MAC address, which is relatively simple to be sniffed out and stolen. WPA-PSK/WPA2-PSK/WPA3-SAE uses a passphrase or key to authenticate your wireless connection. The key is an alphanumeric password between 8 and 63 characters long. The password can include symbols (!?*&_) and spaces. This key must be the exact same key entered on your wireless router or access point. Further, The Simultaneous Authentication of Equals (SAE) of WPA3 enhances the protection against dictionary attacks. WPA/WPA2 incorporates user authentication through the Extensible Authentication Protocol (EAP). EAP is built on a more secure public key encryption system to ensure that only authorized network users can access the network. WPA3 has the strongest encryption among these with the increased cryptographic capability and the requirements of the Protected Management Frames (PMFs) to protect from snooping attack. D-Link R12 User Manual 120

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148

120
D-Link R12 User Manual
Appendix D - Wireless Security
Wireless Security
This section will show you the different levels of security you can use to protect your data from intruders. The router offers the
following types of security:
• WPA3 (Wi-Fi Protected Access 3)
• WPA2 (Wi-Fi Protected Access 2)
• WPA2-PSK (Pre-Shared Key)
• WPA (Wi-Fi Protected Access)
• WPA-PSK (Pre-Shared Key)
What is WPA?
WPA (Wi-Fi Protected Access), is a Wi-Fi standard that was designed to improve the security features of WEP (Wired
Equivalent Privacy).
The 2 major improvements over WEP:
Improved data encryption through the Temporal Key Integrity Protocol (TKIP). TKIP scrambles the keys using a
hashing algorithm and by adding an integrity-checking feature, ensures that the keys haven’t been tampered
with. WPA2 is based on 802.11i and uses Advanced Encryption Standard (AES) instead of TKIP.
User authentication, which is generally missing in WEP, through the extensible authentication protocol (EAP). WEP
regulates access to a wireless network based on a computer’s hardware-specific MAC address, which is relatively
simple to be sniffed out and stolen.
WPA-PSK/WPA2-PSK/WPA3-SAE uses a passphrase or key to authenticate your wireless connection. The key is an alpha-
numeric password between 8 and 63 characters long. The password can include symbols (!?*&_) and spaces. This key must
be the exact same key entered on your wireless router or access point. Further, The Simultaneous Authentication of Equals
(SAE) of WPA3 enhances the protection against dictionary attacks.
WPA/WPA2 incorporates user authentication through the Extensible Authentication Protocol (EAP). EAP is built on a more
secure public key encryption system to ensure that only authorized network users can access the network.
WPA3 has the strongest encryption among these with the increased cryptographic capability and the requirements of the
Protected Management Frames (PMFs) to protect from snooping attack.