Netgear WNR3500Lv2 User Manual - Page 23

Wireless Security Options, WPA-PSK TKIP, WPA2-PSK AES

Page 23 highlights

RangeMax™ Wireless-N Gigabit Router with USB WNR3500L User Manual Wireless Security Options Computers can connect over a 802.11g or 802.11n network at a range of up to 300 feet. Such distances can allow for others outside your immediate area to access your network. Unlike wired network data, your wireless data transmissions can extend beyond your walls and can be received by anyone with a compatible adapter. For this reason, use the security features of your wireless equipment. The WNR3500L router provides highly effective security features which are covered in detail in this chapter. Deploy the security features appropriate to your needs. There are several ways you can enhance the security of your wireless network: 1. Open system: Easy, but no security 2. WEP: Security, but some performance impact 3. WPA-PSK: Strong security 4. WPA-2-PSK: Very strong security Figure 2-1 • WEP. Wired Equivalent Privacy (WEP) data encryption provides data security. WEP Shared Key authentication and WEP data encryption block all but the most determined eavesdropper. This data encryption mode has been superseded by WPA-PSK and WPA2-PSK. • WPA-PSK (TKIP), WPA2-PSK (AES). Wi-Fi Protected Access (WPA) using a pre-shared key to perform authentication and generate the initial data encryption keys. The very strong authentication along with dynamic per frame re-keying of WPA makes it virtually impossible to compromise. For more information about wireless technology, see the link to the online document in "Wireless Networking Basics" in Appendix B. Safeguarding Your Network 2-3 v1.0, November 2009

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133

RangeMax™ Wireless-N Gigabit Router with USB WNR3500L User Manual
Safeguarding Your Network
2-3
v1.0, November 2009
Wireless Security Options
Computers can connect over a 802.11g or 802.11n network at a range of up to 300 feet. Such
distances can allow for others outside your immediate area to access your network.
Unlike wired network data, your wireless data transmissions can extend beyond your walls and
can be received by anyone with a compatible adapter. For this reason, use the security features of
your wireless equipment. The WNR3500L router provides highly effective security features which
are covered in detail in this chapter. Deploy the security features appropriate to your needs.
There are several ways you can enhance the security of your wireless network:
WEP.
Wired Equivalent Privacy (WEP) data encryption provides data security. WEP Shared
Key authentication and WEP data encryption block all but the most determined eavesdropper.
This data encryption mode has been superseded by WPA-PSK and WPA2-PSK.
WPA-PSK (TKIP), WPA2-PSK (AES)
. Wi-Fi Protected Access (WPA) using a pre-shared
key to perform authentication and generate the initial data encryption keys. The very strong
authentication along with dynamic per frame re-keying of WPA makes it virtually impossible
to compromise.
For more information about wireless technology, see the link to the online document in
“Wireless
Networking Basics” in Appendix B
.
Figure 2-1
1. Open system
: Easy, but
no security
2. WEP
: Security, but some
performance impact
3. WPA-PSK
: Strong security
4. WPA-2-PSK
: Very strong
security