Belkin F5D7634-4A-H User Manual

Page 36

Advertising
background image

34

G Wireless Modem Router

sections

table of contents

1

2

3

4

6

7

8

9

10

5

ManUallY ConfIGURInG YoUR RoUTeR

encryption/security

Name

64-Bit Wired

Equivalent

Privacy

128-Bit Wired

Equivalent

Privacy

Wi-Fi Protected

Access-TKIP

Wi-Fi Protected

Access 2

Acronym

64-bit WEP

128-bit WEP

WPA-TKIP/AES

(or just WPA)

WPA2-AES (or

just WPA2)

Security

Good

Better

Best

Best

Features

Static keys

Static keys

Dynamic key

encryption

and mutual

authentication

Dynamic key

encryption

and mutual

authentication

Encryption

keys based on

RC4 algorithm

(typically

40-bit keys)

More secure

than 64-bit

WEP using a

key length of

104 bits plus

24 additional

bits of system-

generated data

TKIP (Temporal

Key Integrity

Protocol) added

so that keys

are rotated and

encryption is

strengthened

AES (Advanced

Encryption

Standard) does

not cause any

throughput loss

securing your Wi-fi network

Here are a few different ways you can

maximize the security of your wireless network

and protect your data from prying eyes and

ears� This section is intended for the home,

home-office, and small-office user� At the time

of this User Manual’s publication, there are

four encryption methods available�

Advertising