30
Authentication
Type:
Select
Open
or
Shared
from
the
drop
‐
down
list.
WEP
Key
Format:
Select
Hex
or
ASCII
from
the
drop
‐
down
list.
Key
Select:
Select
a
key
from
the
preset
keys
1
‐
4
for
current
use.
WPA
‐
PSK
The
WPA
protocol
implements
the
majority
of
the
IEEE
802.11i
standard.
It
enhances
data
encryption
through
the
Temporal
Key
Integrity
Protocol
(TKIP)
which
is
a
128
‐
bit
per
‐
packet
key,
meaning
that
it
dynamically
generates
a
new
key
for
each
packet.
WPA
also
includes
a
message
integrity
check
feature
to
prevent
data
packets
from
being
tampered
with.
Only
authorized
network
users
can
access
the
wireless
network.
WPA
adopts
enhanced
encryption
algorithm
over
WEP.
Summary of Contents for F452
Page 1: ...Wireless N450 Gigabit Router 1...
Page 39: ...39...