Linksys WCG200 User Guide - Page 58
WPA-Personal, WPA-Enterprise, RADIUS, connected to the Router or other device. First
UPC - 745883583935
View all Linksys WCG200 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 58 highlights
Wireless-G Cable Gateway with dynamic encryption keys, while WPA2-Enterprise only uses AES encryption. RADIUS (Remote Authentication Dial-In User Service) utilizes a RADIUS server for authentication. WPA-Personal. If you do not have a RADIUS server, select the type of algorithm you want to use, TKIP or AES, and enter a password in the Passphrase field of 8-63 characters. WPA2-Personal. Enter a password in the Passphrase field of 8-63 characters. WPA-Enterprise. WPA used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router or other device.) WPA-Enterprise offers two encryption methods, TKIP and AES, with dynamic encryption keys. Enter the RADIUS server's IP Address and port number, along with a key shared between the device and the server. Last, enter a Group Key Renewal period, which instructs the device how often it should change the encryption keys. WPA2-Enterprise. WPA2 used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router or other device.) WPA-Enterprise offers two encryption methods, AES and TKIP + AES, with dynamic encryption keys. Enter the RADIUS server's IP Address and port number, along with a key shared between the device and the server. Last, enter a Group Key Renewal period, which instructs the device how often it should change the encryption keys. RADIUS. WEP used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router or other device.) First, enter the RADIUS server's IP Address and port number, along with a key shared between the device and the server. Then, select a WEP key and a level of WEP encryption, and either generate a WEP key through the Passphrase or enter the WEP key manually. Implementing encryption may have a negative impact on your network's performance, but if you are transmitting sensitive data over your network, encryption should be used. These security recommendations should help keep your mind at ease while you are enjoying the most flexible and convenient technology Linksys has to offer. Appendix B: Wireless Security 52 Security Threats Facing Wireless Networks