Netgear WNR2000 User Manual Page 33

  • Download
  • Add to my manuals
  • Print
  • Page
    / 144
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 32
NETGEAR Wireless-N Router User Manual
Safeguarding Your Network 2-3
v1.2, January 2009
Use Wi-Fi Protected Setup (WPS) to automatically set the SSID and implement WPA/
WPA2 security on both the router and the client device. If the clients in your network are
WPS capable, you can use Wi-Fi Protected Setup (WPS) to automatically set the SSID and
implement WPA/WPA2 security on both the router and the client device (see “Using Push 'N'
Connect (Wi-Fi Protected Setup)” on page 2-13).
Basic security options are listed in order of increasing effectiveness in Table 2-1. Other features
that affect security are listed in Table 2-2 on page 2-4. For more details on wireless security
methods, click the link to the online document “Wireless Networking Basics” in Appendix B.
Table 2-1. Wireless Security Options
Security Type Description
None. No wireless security. Recommended only for
troubleshooting wireless connectivity. Do not run an
unsecured wireless network unless it is your
intention to provide free Internet access for the
public.
WEP. Wired Equivalent Privacy. Wired Equivalent Privacy (WEP) data encryption
provides moderate data security. WEP Shared Key
authentication and WEP data encryption can be
defeated by a determined eavesdropper using
publicly available tools.
For more information, see “Configuring WEP
Wireless Security” on page 2-9.
WPA-PSK (TKIP). WPA-PSK standard encryption
with TKIP encryption type.
WPA2-PSK (AES). Wi-Fi Protected Access version 2
with Pre-Shared Key; WPA2-PSK standard
encryption with the AES encryption type.
WPA-PSK (TKIP) + WPA2-PSK (AES). Mixed mode.
Wi-Fi Protected Access with Pre-Shared Key (WPA-
PSK and WPA2-PSK) data encryption provides
extremely strong data security, very effectively
blocking eavesdropping. Because WPA and WPA2
are relatively new standards, older wireless adapters
and devices might not support them.
For more information, see “Configuring WPA-PSK
and WPA2-PSK Wireless Security” on page 2-10.
Page view 32
1 2 ... 28 29 30 31 32 33 34 35 36 37 38 ... 143 144

Comments to this Manuals

No comments