
141
D-Link DIR-878 User Manual
Appendix B - Networking Basics
Wireless Security
This section will show you the different levels of security you can use to protect your data from intruders. The DIR-878 offers the following
types of security:
t81" 8J'J1SPUFDUFE"DDFTT
t81"14, 1SF4IBSFE,FZ
t81" 8J'J1SPUFDUFE"DDFTT
t81"14, 1SF4IBSFE,FZ
What is WPA?
WPA (Wi-Fi Protected Access), is a Wi-Fi standard that was designed to improve the security features of WEP (Wired Equivalent Privacy).
The 2 major improvements over WEP:
t *NQSPWFEEBUBFODSZQUJPOUISPVHIUIF5FNQPSBM,FZ*OUFHSJUZ1SPUPDPM 5,*15,*1TDSBNCMFTUIFLFZTVTJOHBIBTIJOH
algorithm and by adding an integrity-checking feature, ensures that the keys haven’t been tampered with. WPA2 is
based on 802.11i and uses Advanced Encryption Standard (AES) instead of TKIP.
t 6TFSBVUIFOUJDBUJPOXIJDIJTHFOFSBMMZNJTTJOHJO8&1UISPVHIUIFFYUFOTJCMFBVUIFOUJDBUJPOQSPUPDPM &"18&1
regulates access to a wireless network based on a computer’s hardware-specific MAC address, which is relatively simple
to be sniffed out and stolen. EAP is built on a more secure public-key encryption system to ensure that only authorized
network users can access the network.
WPA-PSK/WPA2-PSK uses a passphrase or key to authenticate your wireless connection. The key is an alpha-numeric password between
8 and 63 characters long. The password can include symbols (!?*&_) and spaces. This key must be the exact same key entered on your
wireless router or access point.
WPA/WPA2 incorporates user authentication through the Extensible Authentication Protocol (EAP). EAP is built on a more secure public
key encryption system to ensure that only authorized network users can access the network.