MicroNet Technology SP906GK User Manual

Page 16

Advertising
background image

- 13 -

password in their access point or gateway, as well as in
each wireless station in the network. WPA-PSK takes
over automatically from that point, keeping
unauthorized users that don't have the matching
password from joining the network, while encrypting
the data traveling between authorized devices.

WPA2 – Like WPA, WPA2 supports IEEE 802.1 x/EAP
authentication or PSK technology. It also includes a
new advanced encryption mechanism using the
Advanced Encryption Standard (AES). AES is required
by the corporate user or government users. The
difference between WPA and WPA2 is that WPA2
provides data encryption via the AES. In contrast, WPA
uses Temporal Key Integrity Protocol (TKIP).

WPA2-PSK – WPA2-PSK is also for home and small
business. The difference between WPA-PSK and
WPA2-PSK is that WPA2-PSK provides data
encryption via the AES. In contrast, WPA-PSK uses
Temporal Key Integrity Protocol (TKIP).

WPA 802.1X – Set the wireless devices using a WPA
802.1X mode

WPA2 802.1X – Set the wireless devices using a
WPA2 802.1X mode

Data encryption

None – Disable the encryption mode.

WEP – Enable the WEP Data Encryption. When the
item is selected, you have to continue setting the WEP
Encryption keys.

TKIP – TKIP (Temporal Key Integrity Protocol)
changes the temporal key every 10,000 packets (a
packet is a kind of message transmitted over a
network.) This ensures much greater security than the
standard WEP security.

AES – AES has been developed to ensure the highest
degree of security and authenticity for digital
information and is the most advanced solution defined
by IEEE 802.11i for security in the wireless network.

Note: All devices in the network should use the same
encryption method to ensure the communication.

Advertising