54
D-Link DCH-M225 User Manual
Appendix C - Wireless Security
Wireless Security Options
What is the best way to secure your wireless computer network? There are several security protocols with various versions from
which to choose. Depending on the wireless device, you may have to select from different levels of security. The description
of security protocols, encryption and authentication that follows is intended to help you better understand your choices.
WPA
( Wi-Fi Protected Access) and
WPA2
(Wi-Fi Protected Access II ) are two security protocols that were developed by the Wi-Fi Alliance (WFA)
to replace the less-secure
WEP
(Wired Equivalent Privacy). The WFA is a trade association that certifies Wi-Fi® products that are compliant with
standards of interoperability. IEEE 802.11 is the set of specifications for implementing WLAN (Wireless Local Area Network) computer communication
within the 2.4 to 5GHZ frequency bands. WLAN typically provides a connection between wireless devices to the Internet using an AP (access point).
WPA
was originally referred to as the draft IEEE 802.11i standard, since it became available first, and was intended as an intermediate solution
pending the availability of a full IEEE 802.11i standard.
WPA2
was known as IEEE 802.11i-2004, the year it first became available. Wi-Fi devices that
have been certified since 2006 generally support both
WPA
and
WPA2
.
WPS
(Wi-Fi Protected Setup™) provides the easiest way to establish a secure wireless network for home or small office (SOHO) environments.
Introduced in 2007,
WPS
was created by WFA so that users who might otherwise be intimidated by the available security options could set up a
secure network, and later add new devices, with a simple automated process. PBC (Push Button Configuration) requires just the push of a button.
Today most wireless devices, from routers to wireless printers and cameras, have a
WPS
button.
WPS
enables WPA2 security protocol.
Security Protocols
Summary of Contents for DCH-M225
Page 1: ......