User's Manual

40D-Link DIR-836L User Manual
Section 4 - Security
Wireless Security
5IJTTFDUJPOXJMM TIPXZPVUIFEJòFSFOUMFWFMTPG TFDVSJUZZPVDBOVTFUPQSPUFDUZPVSEBUBGSPNJOUSVEFST5IF%*3-PòFSTUIF
GPMMPXJOHUZQFTPGTFDVSJUZ
t81"8J'J1SPUFDUFE"DDFTT t81"14,1SF4IBSFE,FZ
t81"8J'J1SPUFDUFE"DDFTT t81"14,1SF4IBSFE,FZ
What is WPA?
81"8J'J1SPUFDUFE"DDFTTJTB8J'JTUBOEBSEUIBUXBTEFTJHOFEUPJNQSPWFUIFTFDVSJUZGFBUVSFTPG8&18JSFE&RVJWBMFOU1SJWBDZ
5IFNBKPSJNQSPWFNFOUTPWFS8&1
t *NQSPWFEEBUBFODSZQUJPOUISPVHIUIF5FNQPSBM,FZ*OUFHSJUZ1SPUPDPM5,*15,*1TDSBNCMFTUIFLFZTVTJOHBIBTIJOH
algorithm and, by adding an integrity-checking feature, ensures that the keys haven’t been tampered with. WPA2 is
based on 802.11i and uses Advanced Encryption Standard (AES) instead of TKIP.
t 6TFSBVUIFOUJDBUJPOXIJDIJTHFOFSBMMZNJTTJOHJO8&1 UISPVHIUIFFYUFOTJCMFBVUIFOUJDBUJPOQSPUPDPM&"18&1
regulates access to a wireless network based on a computers hardware-specic MAC address, which is relatively simple
to be snied out and stolen. EAP is built on a more secure public-key encryption system to ensure that only authorized
network users can access the network.
WPA-PSK/WPA2-PSK uses a passphrase or key to authenticate your wireless connection. The key is an alpha-numeric password between
BOEDIBSBDUFSTMPOH5IFQBTTXPSEDBOJODMVEFTZNCPMT @BOETQBDFT5IJTLFZNVTUCFUIFFYBDUTBNFLFZFOUFSFEPOZPVS
wireless router or access point.
WPA/WPA2 incorporates user authentication through the Extensible Authentication Protocol (EAP). EAP is built on a more secure public
key encryption system to ensure that only authorized network users can access the network.