ADSL Router
User Manual
29
There are several security methods to choose from, depending on user’s needs and
the capabilities of user’s wireless machines.
WEP open
and
WEP shared
—WEP is an encryption scheme that is used
to protect user’s wireless data communications. WEP uses a combination
of 64-bit keys or 128-
bit keys to provide access control to user’s network
and encryption security for every data transmission. To decode a data
transmission, each wireless client on the network must use an identical
64-bit or 128-bit key. WEP is an older wireless encryption method that is
not as hard to break as the more-recent WPA.
802.1x
— In 802.1x (also known as RADIUS), a separate machine called an
authentication server receives a user ID and password. It grants or denies
access based on whether the ID and password match any entries in its
account list. User can optionally enable WEP encryption with this option.
Because it requires a separate machine acting as the authentication server,
802.1x is most often used in business environments.
WPA
— WPA is a more recent encryption method that addresses many of
the weaknesses in WEP. Any client capable of WPA encryption should use
it instead of WEP.
WPA (PSK)
— This is WPA encryption combined with a
pre-shared key
(PSK)
, which is a text string known only to the gateway and authorized
wireless clients. The gateway rejects the login if the client's PSK does not
match.
WPA2
— WPA2 is a more advanced encryption method than WPA. Because
it is a more recent standard, some of user’s wireless devices might not be
able to use it.
WPA2 (PSK)
— This option uses WPA2 with a pre-shared key.
WPA2 and WPA
— This option supports WPA2/WPA encryption for devices
capable of one or the other standard. The gateway automatically detects
whether a particular device can use WPA2 or WPA.
WPA2 AND WPA (PSK)
— This has WPA2 or WPA encryption based on