Using the web-based advanced user interface, Securing your wi-fi, Network – Belkin Range Extender/ Access Point User Manual
Page 27

25
24
Using the Web-Based Advanced User Interface
25
24
Using the Web-Based Advanced User Interface
The example below illustrates using Repeater mode to extend the
range of your wireless network. In this example, the WURE is set up
to connect to the wireless router located in another area.
���������������
��������
��������
���������������
Wireless G
Universal Range
Extender
Wireless G
Notebook Card
Wireless G
Router
Wireless G
Desktop Card
Note: Laptops can roam or move between the two wireless coverage
areas if the SSID and the parent access point’s SSID match.
Securing your Wi-Fi
®
Network
Here are a few different ways you can maximize the security of
your wireless network and protect your data from prying eyes and
ears. This section is intended for the home, home-office, and small-
office user. At the time of this manual’s publication, there are four
encryption methods available.
Name
64-bit Wired
Equivalent
Privacy
128-bit Wired
Equivalent Privacy
Wi-Fi Protected
Access-TKIP
With Protected
Access
Acronym
64-bit WEP
128-bit WEP
WPA-TKIP
WPA2-AES
Security
Good
Better
Best
Best
Features
Static keys
Static keys
Dynamic key
encryption
and mutual
authentication
Dynamic key
encryption
and mutual
authentication
Encryption
keys based on
RC4 algorithm
(typically
40-bit keys)
More secure than
64-bit WEP using
a key length of
104 bits plus 24
additional bits of
system-generated
data
TKIP (temporal
key integrity
protocol) added
so that keys
are rotated and
encryption is
strengthened
AES (Advanced
Encryption
Standard) does
not cause any
throughput loss