Wireless-G Broadband Router with 2 Phone Ports
84
Appendix B: Wireless Security
Security Threats Facing Wireless Networks
WPA RADIUS
. WPA used in coordination with a RADIUS server. (This should only be used when a RADIUS
server is connected to the Router or other device.) First, select the type of WPA algorithm,
TKIP
or
AES
. Enter
the RADIUS server’s IP Address and port number, along with a key shared between the device and the server.
Last, enter a Group Key Renewal period, which instructs the device how often it should change the
encryption keys.
Implementing encryption may have a negative impact on your network’s performance, but if you are transmitting
sensitive data over your network, encryption should be used.
These security recommendations should help keep your mind at ease while you are enjoying the most flexible
and convenient technology Linksys has to offer.
Содержание Linksys WRT54GP2
Страница 16: ...Wireless G Broadband Router with 2 Phone Ports 10 Chapter 3 Getting to Know the Router The Front Panel ...
Страница 86: ...Wireless G Broadband Router with 2 Phone Ports 80 Appendix A Troubleshooting Frequently Asked Questions ...
Страница 94: ...Wireless G Broadband Router with 2 Phone Ports 88 Appendix D Windows Help ...
Страница 106: ...Wireless G Broadband Router with 2 Phone Ports 100 Appendix G Warranty Information ...
Страница 110: ...Wireless G Broadband Router with 2 Phone Ports 104 Appendix I Contact Information ...
Страница 111: ......
Страница 112: ...www linksys com ...