beautypg.com

Using the web-based advanced user interface, Securing your wi-fi, Network – Belkin Range Extender/ Access Point User Manual

Page 27

background image

25

24

Using the Web-Based Advanced User Interface

25

24

Using the Web-Based Advanced User Interface

The example below illustrates using Repeater mode to extend the
range of your wireless network. In this example, the WURE is set up
to connect to the wireless router located in another area.

���������������

��������

��������

���������������

Wireless G

Universal Range

Extender

Wireless G

Notebook Card

Wireless G

Router

Wireless G

Desktop Card

Note: Laptops can roam or move between the two wireless coverage
areas if the SSID and the parent access point’s SSID match.

Securing your Wi-Fi

®

Network

Here are a few different ways you can maximize the security of
your wireless network and protect your data from prying eyes and
ears. This section is intended for the home, home-office, and small-
office user. At the time of this manual’s publication, there are four
encryption methods available.

Name

64-bit Wired

Equivalent

Privacy

128-bit Wired

Equivalent Privacy

Wi-Fi Protected

Access-TKIP

With Protected

Access

Acronym

64-bit WEP

128-bit WEP

WPA-TKIP

WPA2-AES

Security

Good

Better

Best

Best

Features

Static keys

Static keys

Dynamic key
encryption
and mutual
authentication

Dynamic key
encryption
and mutual
authentication

Encryption
keys based on
RC4 algorithm
(typically
40-bit keys)

More secure than
64-bit WEP using
a key length of
104 bits plus 24
additional bits of
system-generated
data

TKIP (temporal
key integrity
protocol) added
so that keys
are rotated and
encryption is
strengthened

AES (Advanced
Encryption
Standard) does
not cause any
throughput loss