
Chapter 7 Wireless LAN
User
’
s Guide
84
Local user databases also have an additional limitation that is explained in the
next section.
Encryption
Wireless networks can use encryption to protect the information that is sent in the
wireless network. Encryption is like a secret code. If you do not know the secret
code, you cannot understand the message.
The types of encryption you can choose depend on the type of user
authentication. (See
Section on page 83
for information about this.)
For example, if the wireless network has a RADIUS server, you can choose
WPA
or
WPA2
. If users do not log in to the wireless network, you can choose no
encryption,
Static WEP
,
WPA-PSK
, or
WPA2-PSK
.
Usually, you should set up the strongest encryption that every wireless client in
the wireless network supports. For example, suppose the AP does not have a local
user database, and you do not have a RADIUS server. Therefore, there is no user
authentication. Suppose the wireless network has two wireless clients. Device A
only supports WEP, and device B supports WEP and WPA. Therefore, you should
set up
Static WEP
in the wireless network.
Note: It is recommended that wireless networks use
WPA-PSK
,
WPA
, or stronger
encryption. IEEE 802.1x and WEP encryption are better than none at all, but it
is still possible for unauthorized devices to figure out the original information
pretty quickly.
Note: It is not possible to use
WPA-PSK
,
WPA
or stronger encryption with a local user
database. In this case, it is better to set up stronger encryption with no
authentication than to set up weaker encryption with the local user database.
When you select
WPA2
or
WPA2-PSK
in your NBG4115, you can also select an
option (
WPA Compatible
) to support WPA as well. In this case, if some wireless
clients support WPA and some support WPA2, you should set up
WPA2-PSK
or
WPA2
(depending on the type of wireless network login) and select the
WPA
Compatible
option in the NBG4115.
Table 25
Types of Encryption for Each Type of Authentication
NO AUTHENTICATION RADIUS SERVER
Weakest
No Security
WPA
Static WEP
WPA-PSK
Stronges
t
WPA2-PSK
WPA2
C
om
pan
y
C
on
fiden
tial
Summary of Contents for NBG-417N
Page 9: ...Contents Overview User s Guide 10 C o m p a n y C o n f i d e n t i a l...
Page 17: ...Table of Contents User s Guide 18 C o m p a n y C o n f i d e n t i a l...
Page 19: ...20 C o m p a n y C o n f i d e n t i a l...
Page 23: ...Chapter 1 Introduction User s Guide 24 C o m p a n y C o n f i d e n t i a l...
Page 25: ...Chapter 2 The WPS Button User s Guide 26 C o m p a n y C o n f i d e n t i a l...
Page 37: ...Chapter 3 The Web Configurator User s Guide 38 C o m p a n y C o n f i d e n t i a l...
Page 53: ...Chapter 4 Connection Wizard User s Guide 54 C o m p a n y C o n f i d e n t i a l...
Page 61: ...Chapter 5 AP Mode User s Guide 62 C o m p a n y C o n f i d e n t i a l...
Page 77: ...Chapter 6 Tutorials User s Guide 78 C o m p a n y C o n f i d e n t i a l...
Page 79: ...80 C o m p a n y C o n f i d e n t i a l...
Page 117: ...Chapter 9 LAN User s Guide 118 C o m p a n y C o n f i d e n t i a l...
Page 123: ...Chapter 10 DHCP Server User s Guide 124 C o m p a n y C o n f i d e n t i a l...
Page 137: ...Chapter 12 DDNS User s Guide 138 C o m p a n y C o n f i d e n t i a l...
Page 138: ...139 PART III Security Firewall 141 Content Filtering 147 C o m p a n y C o n f i d e n t i a l...
Page 139: ...140 C o m p a n y C o n f i d e n t i a l...
Page 145: ...Chapter 13 Firewall User s Guide 146 C o m p a n y C o n f i d e n t i a l...
Page 151: ...152 C o m p a n y C o n f i d e n t i a l...
Page 155: ...Chapter 15 Static Route User s Guide 156 C o m p a n y C o n f i d e n t i a l...
Page 167: ...Chapter 17 Remote Management User s Guide 168 C o m p a n y C o n f i d e n t i a l...
Page 177: ...Chapter 18 UPnP User s Guide 178 C o m p a n y C o n f i d e n t i a l...
Page 179: ...180 C o m p a n y C o n f i d e n t i a l...
Page 185: ...Chapter 19 System User s Guide 186 C o m p a n y C o n f i d e n t i a l...
Page 197: ...Chapter 22 Sys OP Mode User s Guide 198 C o m p a n y C o n f i d e n t i a l...
Page 199: ...Chapter 23 Language User s Guide 200 C o m p a n y C o n f i d e n t i a l...
Page 207: ...Chapter 24 Troubleshooting User s Guide 208 C o m p a n y C o n f i d e n t i a l...
Page 209: ...210 C o m p a n y C o n f i d e n t i a l...
Page 213: ...Appendix A Product Specifications User s Guide 214 C o m p a n y C o n f i d e n t i a l...
Page 279: ...Index User s Guide 280 C o m p a n y C o n f i d e n t i a l...