39
Manually Configuring your Router
Manually Configuring your Router
39
Manually Configuring your Router
se
ct
io
n
2
1
3
4
5
6
7
8
9
10
12
between A–F and 0–9 in each box. You will use this key to program the
encryption settings on your Router and your wireless computers.
Note to Mac users
: Original Apple AirPort® products support 64-bit
encryption only. Apple AirPort 2 products can support 64-bit or 128-
bit encryption. Please check your product to see which version you are
using. If you cannot configure your network with 128-bit encryption, try
64-bit encryption.
WPA (Wi-Fi Protected Access)
WPA (Wi-Fi Protected Access) is a new Wi-Fi standard that was designed
to improve upon the security features of WEP. To use WPA security,
the drivers and software of your wireless equipment must be upgraded
to support WPA. These updates will be found on the wireless vendors’
websites. There are two types of WPA security: WPA-Personal (PSK) and
WPA-Enterprise (RADIUS).
WPA-Personal (PSK)
This method uses what is known as a Pre-Shared key as the Network
key. A Network key is basically a password that is between eight and
63 characters long. It can be a combination of letters, numbers, or
characters. Each client uses the same Network key to access the network.
Typically, this is the mode that will be used in a home environment.
WPA-Enterprise (RADIUS)
With this system, a radius server distributes the Network key to the clients
automatically. This is typically found in a business environment. For a list
of Belkin wireless products that support WPA, please visit our website at
www.belkin.com/networking
.
WPA2 (WiFi Protected Access)
WPA2 is the second generation of WPA based 802.11i standard. It
offers higher level of wireless security by combining advanced network
authentication and stronger AES encryption method. Like WPA security,
WPA2 is available in both WPA2-Personal (PSK) mode and WPA2-
Enterprise (RADIUS) mode. Typically, WPA2-Personal (PSK) is the mode
that will be used in a home environment, while WPA-Enterprise (RADIUS)
is implemented in a business environment where an external radius server
distributes the network key to the clients automatically.