Netgear DG834G DG834Gv5 Reference Manual - Page 31

Wireless Security Options, WPA-802.1x, WPA-PSK TKIP, WPA2-PSK AES - maximum wireless connections

Page 31 highlights

Wireless ADSL2+ Modem Router DG834G User Manual The time it takes to establish a wireless connection can vary depending on both your security settings and placement. WEP connections can take slightly longer to establish. Also, WEP encryption can consume more battery power on a notebook computer. Wireless Security Options Indoors, computers can connect over 802.11g wireless networks at a maximum range of up to 300 feet. Such distances can allow for others outside your immediate area to access your network. Unlike wired network data, your wireless data transmissions can extend beyond your walls and can be received by anyone with a compatible adapter. For this reason, use the security features of your wireless equipment. The ADSL2+ Modem Wireless Router provides highly effective security features which are covered in detail in this chapter. Deploy the security features appropriate to your needs. There are several ways you can enhance the security of your wireless network: Figure 2-1 • WEP. Wired Equivalent Privacy (WEP) data encryption provides data security. WEP Shared Key authentication and WEP data encryption block all but the most determined eavesdropper. This data encryption mode has been superseded by WPA-PSK and WPA2-PSK (see "Configuring WEP" on page 2-4).. • WPA-802.1x, WPA2-802.1x. Wi-Fi Protected Access (WPA) with user authentication implemented using IEE 802.1x and RADIUS servers. • WPA-PSK (TKIP), WPA2-PSK (AES). Wi-Fi Protected Access (WPA) using a pre-shared key to perform authentication and generate the initial data encryption keys. The very strong authentication along with dynamic per frame re-keying of WPA makes it virtually impossible to compromise"Configuring WPA, WPA2, or WPA/WPA2" on page 2-6). Configuring Your Wireless Network and Security Settings 2-3 v1.0, May 2008

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176

Wireless ADSL2+ Modem Router DG834G User Manual
Configuring Your Wireless Network and Security Settings
2-3
v1.0, May 2008
The time it takes to establish a wireless connection can vary depending on both your security
settings and placement. WEP connections can take slightly longer to establish. Also, WEP
encryption can consume more battery power on a notebook computer.
Wireless Security Options
Indoors, computers can connect over 802.11g wireless networks at a maximum range of up to 300
feet. Such distances can allow for others outside your immediate area to access your network.
Unlike wired network data, your wireless data transmissions can extend beyond your walls and
can be received by anyone with a compatible adapter. For this reason, use the security features of
your wireless equipment. The ADSL2+ Modem Wireless Router provides highly effective security
features which are covered in detail in this chapter. Deploy the security features appropriate to
your needs.
There are several ways you can enhance the security of your wireless network:
WEP.
Wired Equivalent Privacy (WEP) data encryption provides data security. WEP Shared
Key authentication and WEP data encryption block all but the most determined eavesdropper.
This data encryption mode has been superseded by WPA-PSK and WPA2-PSK (see
“Configuring WEP” on page 2-4
)..
WPA-802.1x, WPA2-802.1x
. Wi-Fi Protected Access (WPA) with user authentication
implemented using IEE 802.1x and RADIUS servers.
WPA-PSK (TKIP), WPA2-PSK (AES)
. Wi-Fi Protected Access (WPA) using a pre-shared
key to perform authentication and generate the initial data encryption keys. The very strong
authentication along with dynamic per frame re-keying of WPA makes it virtually impossible
to compromise
“Configuring WPA, WPA2, or WPA/WPA2” on page2-6
).
Figure 2-1