Network Router User Manual
www.kraun.it 16
User’s Manual
Integrity Protocol (TKIP). TKIP addresses the encryption weaknesses
of WEP. Another key component of WPA is built-in authentication that
WEP does not offer. With this feature, WPA provides roughly compa-
rable security to VPN tunneling with WEP, with the benefit of easier
administration and use. This is similar to 802.1x support and requires
a RADIUS server in order to implement. The Wi-Fi Alliance will call this,
‘WPA-Enterprise. ‘ One variation of WPA is called WPA Pre Shared Key
or WPA-PSK for short - this provides an authentication alternative to
an expensive RADIUS server. WPA-PSK is a simplified but still pow-
erful form of WPA most suitable for home Wi-Fi networking. To use
WPA-PSK, a person sets a static key or “passphrase” as with WEP.
But, using TKIP, WPA-PSK automatically changes the keys at a preset
time interval, making it much more difficult for hackers to find and
exploit them. The Wi-Fi Alliance will call this, ‘WPA-Personal.’
SAFETY NOTICES
Caution: Do not use this product near water, for example,
in a wet basement or near a swimming pool.