User's Manual
Table Of Contents
- Package Contents
- Installation
- Configuration
- Wireless Security
- Connect to a Wireless Network
- Setting Up Wi-Fi Protection (WCN 2.0 in Windows Vista)
- Changing the Computer Name and Joining a Workgroup
- Configuring the IP Address in Vista
- Setting Up a Connection or Network Wirelessly
- Connecting to a Secured Wireless Network (WEP, WPA-PSK & WPA2-PSK)
- Connecting to an Unsecured Wireless Network
- Configuring the Network in MAC OS X Snow Leopard (10.6)
- Configuring the Wireless Network in MAC OS X Snow Leopard (10.6)
- Troubleshooting
- Wireless Basics
- Networking Basics
30D-Link DIR-627 User Manual
Section 4 - Security
WhatisWPA?
WPA, or Wi-Fi Protected Access, is a Wi-Fi standard that was designed to improve the security features of WEP (Wired
Equivalent Privacy).
The two major improvements over WEP:
• Improved data encryption through the Temporal Key Integrity Protocol (TKIP). TKIP scrambles the keys
using a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys haven’t
been tampered with. WPA2 is based on 802.11i and uses Advanced Encryption Standard (AES) instead
of TKIP.
• User authentication, which is generally missing in WEP, through the extensible authentication protocol
(EAP). WEP regulates access to a wireless network based on a computer’s hardware-specic MAC
address, which is relatively simple to be sniffed out and stolen. EAP is built on a more secure public-key
encryption system to ensure that only authorized network users can access the network.
WPA-PSK/WPA2-PSK uses a passphrase or key to authenticate your wireless connection. The key is an alpha-numeric
password between 8 and 63 characters long. The password can include symbols (!?*&_) and spaces. This key must
be the exact same key entered on your wireless router or access point.
WPA/WPA2 incorporates user authentication through the Extensible Authentication Protocol (EAP). EAP is built on a
more secure public key encryption system to ensure that only authorized network users can access the network.










