Wireless Modes; Wireless Security; What Is Wpa - Samsung CY-SWR1100 User Manual

Hide thumbs Also See for CY-SWR1100:
Table of Contents

Advertisement

There are basically two modes of networking:
• Infrastructure – All wireless clients will connect to an access point or wireless router.
• Ad-Hoc – Directly connecting to another computer, for peer-to-peer communication, using wireless network adapters on
each computer, such as two or more wireless network Cardbus adapters.
An Infrastructure network contains an Access Point or wireless router. All the wireless devices, or clients, will connect to the
wireless router or access point.
An Ad-Hoc network contains only clients, such as laptops with wireless cardbus adapters. All the adapters must be in Ad-Hoc
mode to communicate.
This section explains the different levels of security you can use to protect your data from intruders. Your Samsung router
offers wireless security options such as WPA/WPA2 PSK/EAP.
WPA (Wi-Fi Protected Access) is a Wi-Fi standard that was designed to improve the security features of WEP (Wired Equiva-
lent Privacy).
The 2 major improvements over WEP:
• Improved data encryption through the Temporal Key Integrity Protocol (TKIP). TKIP scrambles the keys using a hashing
algorithm and, by adding an integrity-checking feature, ensures that the keys haven't been tampered with. WPA2 is based
on 802.11i and uses Advanced Encryption Standard (AES) instead of TKIP.
• User authentication, which is generally missing in WEP, through the extensible authentication protocol (EAP). WEP regu-
lates access to a wireless network based on a computer's hardware-specific MAC address, which is relatively easy sniff
out and steal. EAP is built on a more secure public-key encryption system to ensure that only authorized network users
can access the network.
WPA-PSK/WPA2-PSK uses a passphrase or key to authenticate your wireless connection. The key is an alpha-numeric pass-
word between 8 and 63 characters long. The password can include symbols (!?*&_) and spaces. This key must be the exact
same key entered on your wireless router or access point.
WPA/WPA2 incorporates user authentication through the Extensible Authentication Protocol (EAP). EAP is built on a more
secure public key encryption system to ensure that only authorized network users can access the network.
S
W
r
u
amSung
ireleSS
outer
Ser
W
IreleSS
W
IreleSS
W
hat IS
'
m
S
anual
m
odeS
S
ecurIty
WPa?
P
97
age

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents