150M Wireless-N Broadband Router
(iB-WRB150N)
39
5.2.3 WPA2-PSK
The later WPA2 protocol features compliance with the full IEEE
802.11i standard and uses Advanced Encryption Standard (AES) in
addition to TKIP encryption protocol to guarantee better security than that
provided by WEP or WPA.
5.2.4 WEP
WEP is intended to provide data confidentiality comparable to that of
a traditional wired network. Two methods of authentication can be used
with WEP: Open System authentication and Shared Key authentication.
●
WEP Key
: You can select either ASCII or Hexadecimal from the
drop-down menu.
Note
: If you select ASCII, enter 5 or 13 valid ASCII characters; or if you
select Hexadecimal, enter 10 or 26 Hexadecimal characters.
●
Default Key
: Select one key from the 4 preset keys.
5.3 MAC Filtering
The MAC filtering feature can be used to allow or disallow clients to
connect to your wireless network.