Descargar Imprimir esta página

Belkin F5D8001 Manual Del Usuario página 21

Tarjeta inalámbrica para ordenador sobremesa

Publicidad

Idiomas disponibles
  • ES

Idiomas disponibles

  • ESPAÑOL, página 170
Using the Belkin Wireless Networking Utility
Wired Equivalent Privacy (WEP)
adopted wireless security protocol. Depending on the security level (64-
or 128-bit), the user will be asked to input a 10- or 26-character hex key.
A hex key is a combination of letters, a–f, and numbers, 0–9.
Wireless Protected Access (WPA)
wireless security. However, not all wireless cards and adapters support
this technology. Please check your wireless adapter's user manual
to check if it supports WPA. Instead of a hex key, WPA uses only
passphrases, which are much easier to remember.
The following section, intended for the home, home-office, and small-
office user, presents a few different ways to maximize the security of
your wireless network.
At the time of publication, four encryption methods are available:
Encryption Methods:
Name
64-bit Wired
Equivalent Privacy
Acronym
64-bit WEP
Security
Good
Features
Static keys
Encryption keys
based on RC4
algorithm (typically
40-bit keys)
All manuals and user guides at all-guides.com
128-Bit Wired
Equivalent
Privacy
128-bit WEP
Better
Static keys
More secure
than 64-bit
WEP using a
key length of
104 bits plus
24 additional
bits of system-
generated data
19
19
is a less secure, but more widely
is the new standard in the
Wi-Fi Protected
Wi-Fi Protected
Access-TKIP
Access 2
WPA-TKIP/AES
WPA2-AES (or
(or just WPA)
just WPA2)
Best
Best
Dynamic key
Dynamic key
encryption
encryption
and mutual
and mutual
authentication
authentication
TKIP (Temporal
AES (Advanced
Key Integrity
Encryption
Protocol) added
Standard) does
so that keys
not cause any
are rotated and
throughput
encryption is
loss
strengthened
1
2
3
4
5
6

Publicidad

loading

Este manual también es adecuado para:

N1