Operation Manual
WL-308 Gaming Router Full Manual
28
๎ Authentication: Select Open, or Shared Key. Authentication method from
the drop-down list. An open system allows any client to authenticate as long
as it conforms to any MAC address filter policies that may have been set. All
authentication packets are transmitted without encryption. Shared Key sends
an unencrypted challenge text string to any device attempting to
communicate with the AP. The device requesting authentication encrypts the
challenge text and sends it back to the access point. If the challenge text is
encrypted correctly, the access point allows the requesting device to
authenticate. It is recommended to select Auto if you are not sure which
authentication type is used.
Click on the Apply button to store these settings.
WPA Personal (Wi-Fi Protected Access)
Select the WPA-Personal radio button if your wireless network uses WPA
encryption. WPA (Wi-Fi Protected Access) was designed to improve upon the
security features of WEP (Wired Equivalent Privacy). The technology is designed
to work with existing Wi-Fi products that have been enabled with WEP. WPA
provides improved data encryption through the Temporal Integrity Protocol
(TKIP), which scrambles the keys using a hashing algorithm and by adding an
integrity checking feature which makes sure that keys havenโt been tampered
with.
๎ WPA Mode: Select the Auto WPA / WPA2 from the drop-down list.
๎ Cipher Type: Select TKIP and AES as the cipher suite. The encryption
algorithm used to secure the data communication.