Belkin N1 Manual Del Usuario página 21

Tarjeta inalámbrica para computadora de escritorio
Ocultar thumbs Ver también para N1:
Tabla de contenido

Publicidad

Idiomas disponibles

Idiomas disponibles

Using the Belkin Wireless Networking Utility
Wired Equivalent Privacy (WEP)
widely adopted wireless security protocol. Depending on the security
level (64- or 128-bit), the user will be asked to input a 10- or 26-
character hex key. A hex key is a combination of letters, a–f, and
numbers, 0–9.
Wireless Protected Access (WPA)
the wireless security. However, not all wireless cards and adapters
support this technology. Please check your wireless adapter's user
manual to check if it supports WPA. Instead of a hex key, WPA uses
only passphrases, which are much easier to remember.
The following section, intended for the home, home-office, and
small-office user, presents a few different ways to maximize the
security of your wireless network.
At the time of publication, four encryption methods are available:
Encryption Methods:
Name
64-bit Wired
Equivalent Privacy
Acronym
64-bit WEP
Security
Good
Features
Static keys
Encryption keys
based on RC4
algorithm (typically
40-bit keys)
is a less secure, but more
is the new standard in
128-Bit Wired
Wi-Fi
Equivalent
Protected
Privacy
Access-TKIP
128-bit WEP
WPA-TKIP/
AES (or just
WPA)
Better
Best
Static keys
Dynamic key
encryption
and mutual
authentication
More secure
TKIP
than 64-bit
(Temporal
WEP using a
Key Integrity
key length of
Protocol)
104 bits plus
added so
24 additional
that keys are
bits of system-
rotated and
generated data
encryption is
strengthened
19
19
Wi-Fi
Protected
Access 2
WPA2-AES (or
just WPA2)
Best
Dynamic key
encryption
and mutual
authentication
AES
(Advanced
Encryption
Standard)
does not
cause any
throughput
loss
1
2
3
4
5
6

Publicidad

Tabla de contenido

Solución de problemas

loading

Tabla de contenido