User's Manual Part 1

69D-Link DAP-1560 User Manual
Section 4 - Security
What is WPA?
81"PS8J'J1SPUFDUFE"DDFTTJTB8J'JTUBOEBSEUIBUXBTEFTJHOFEUPJNQSPWFUIFTFDVSJUZGFBUVSFTPG8&18JSFE&RVJWBMFOU
Privacy).
The 2 major improvements over WEP:
t*NQSPWFEEBUBFODSZQUJPOUISPVHIUIF5FNQPSBM,FZ*OUFHSJUZ1SPUPDPM5,*15,*1TDSBNCMFTUIFLFZTVTJOHB
IBTIJOHBMHPSJUINBOECZBEEJOHBOJOUFHSJUZDIFDLJOHGFBUVSFFOTVSFTUIBUUIFLFZTIBWFOUCFFOUBNQFSFE
with. WPA2 is based on 802.11i and uses Advanced Encryption Standard (AES) instead of TKIP.
t6TFSBVUIFOUJDBUJPOXIJDIJTHFOFSBMMZNJTTJOHJO8&1UISPVHIUIFFYUFOTJCMFBVUIFOUJDBUJPOQSPUPDPM&"1
8&1SFHVMBUFTBDDFTTUPBXJSFMFTTOFUXPSLCBTFEPOBDPNQVUFSTIBSEXBSFTQFDJöD."$BEESFTTXIJDIJT
relatively simple to be snied out and stolen. EAP is built on a more secure public-key encryption system to
ensure that only authorized network users can access the network.
81"14,81"14,VTFTBQBTTQISBTFPSLFZUPBVUIFOUJDBUFZPVSXJSFMFTTDPOOFDUJPO5IFLFZJTBOBMQIBOVNFSJDQBTTXPSE
CFUXFFOBOEDIBSBDUFSTMPOH5IFQBTTXPSEDBOJODMVEFTZNCPMT @BOETQBDFT5IJTLFZNVTUCFUIFFYBDUTBNFLFZ
entered on your wireless bridge or access point.
81"81"JODPSQPSBUFTVTFSBVUIFOUJDBUJPOUISPVHIUIF&YUFOTJCMF"VUIFOUJDBUJPO1SPUPDPM&"1&"1JTCVJMUPOBNPSF
secure public key encryption system to ensure that only authorized network users can access the network.