Planning Your Wireless Network
Protecting Your Network
WAP4410N Wireless-N Access Point with Power Over Internet Administration Guide
12
2
-
Use “Shared Key” authentication.
-
Change your WEP key regularly.
•
WPA/WPA2 Personal—
The WPA-Personal and WPA2-Personal methods
offer two encryption methods, TKIP and AES, with dynamic encryption
keys.
•
WPA /WPA2 Enterprise—
The WPA-Enterprise and WPA2-Enterprise
option requires that your network has a RADIUS server for authentication.
A network encrypted with WPA/WPA2 is more secure than a network
encrypted with WEP, because WPA/WPA2 uses dynamic key encryption.
To protect the information as it passes over the airwaves, you should enable
the highest protection level.
Implementing encryption may have a negative impact on your network’s
performance, but if you are transmitting sensitive data over your network,
encryption should be used.
!
CAUTION
Remember that each device in your wireless network
must
use the same
encryption method and encryption key or your wireless network will not function
properly