Chapter 4 Wireless LAN
P-320W v3 User’s Guide
58
4.3.4 Encryption
Wireless networks can use encryption to protect the information that is sent in the
wireless network. Encryption is like a secret code. If you do not know the secret
code, you cannot understand the message.
The types of encryption you can choose depend on the type of user
authentication. (See
Section 4.3.3 on page 57
for information about this.)
For example, if the wireless network has a RADIUS server, you can choose
WPA
or
WPA2
. If users do not log in to the wireless network, you can choose no
encryption,
Static WEP
,
WPA-PSK
, or
WPA2-PSK
.
Usually, you should set up the strongest encryption that every wireless client in
the wireless network supports. For example, suppose the AP does not have a local
user database, and you do not have a RADIUS server. Therefore, there is no user
authentication. Suppose the wireless network has two wireless clients. Device A
only supports WEP, and device B supports WEP and WPA. Therefore, you should
set up
Static WEP
in the wireless network.
Note: It is recommended that wireless networks use
WPA-PSK
,
WPA
, or stronger
encryption. IEEE 802.1x and WEP encryption are better than none at all, but it
is still possible for unauthorized devices to figure out the original information
pretty quickly.
Note: It is not possible to use
WPA-PSK
,
WPA
or stronger encryption with a local user
database. In this case, it is better to set up stronger encryption with no
authentication than to set up weaker encryption with the local user database.
When you select
WPA2
or
WPA2-PSK
in your P-320W v3, you can also select an
option (
WPA Compatible
) to support WPA as well. In this case, if some wireless
clients support WPA and some support WPA2, you should set up
WPA2-PSK
or
WPA2
(depending on the type of wireless network login) and select the
WPA
Compatible
option in the P-320W v3.
Many types of encryption use a key to protect the information in the wireless
network. The longer the key, the stronger the encryption. Every wireless client in
the wireless network must have the same key.
Table 22
Types of Encryption for Each Type of Authentication
NO AUTHENTICATION RADIUS SERVER
Weakest
No Security
WPA
Static WEP
WPA-PSK
Strongest
WPA2-PSK
WPA2
Summary of Contents for P-320W v3
Page 2: ......
Page 8: ...Safety Warnings P 320W v3 User s Guide 8 ...
Page 10: ...Contents Overview P 320W v3 User s Guide 10 ...
Page 18: ...Table of Contents P 320W v3 User s Guide 18 ...
Page 20: ...20 ...
Page 24: ...Chapter 1 Getting to Know Your P 320W v3 P 320W v3 User s Guide 24 ...
Page 36: ...Chapter 2 Introducing the Web Configurator P 320W v3 User s Guide 36 ...
Page 54: ...54 ...
Page 72: ...Chapter 4 Wireless LAN P 320W v3 User s Guide 72 ...
Page 76: ...Chapter 5 Wireless Client Mode P 320W v3 User s Guide 76 ...
Page 88: ...Chapter 7 LAN P 320W v3 User s Guide 88 ...
Page 104: ...Chapter 10 VLAN P 320W v3 User s Guide 104 ...
Page 105: ...105 PART III Security Firewall 117 Content Filtering 125 ...
Page 106: ...106 ...
Page 116: ...Chapter 11 WAN P 320W v3 User s Guide 116 ...
Page 124: ...Chapter 12 Firewall P 320W v3 User s Guide 124 ...
Page 130: ...130 ...
Page 134: ...Chapter 14 Static Route P 320W v3 User s Guide 134 ...
Page 140: ...Chapter 15 Remote Management P 320W v3 User s Guide 140 ...
Page 154: ...Chapter 16 Universal Plug and Play UPnP P 320W v3 User s Guide 154 ...
Page 155: ...155 PART V Maintenance and Troubleshooting System 157 Logs 163 Product Specifications 193 ...
Page 156: ...156 ...
Page 178: ...Chapter 18 Logs P 320W v3 User s Guide 178 ...
Page 184: ...Chapter 19 Tools P 320W v3 User s Guide 184 ...
Page 192: ...Chapter 20 Troubleshooting P 320W v3 User s Guide 192 ...
Page 196: ...Chapter 21 Product Specifications P 320W v3 User s Guide 196 ...
Page 198: ...198 ...
Page 260: ...Index P 320W v3 User s Guide 260 ...
Page 261: ......
Page 262: ......