Configuration - Unitymedia
Configuration - Unitymedia Configuration - Unitymedia
Section 4 - Security What is WPA? WPA, or Wi-Fi Protected Access, is a Wi-Fi standard that was designed to improve the security features of WEP (Wired Equivalent Privacy). The 2 major improvements over WEP: • Improved data encryption through the Temporal Key Integrity Protocol (TKIP). TKIP scrambles the keys using a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys haven’t been tampered with. WPA2 is based on 802.11i and uses Advanced Encryption Standard (AES) instead of TKIP. • User authentication, which is generally missing in WEP, through the extensible authentication protocol (EAP). WEP regulates access to a wireless network based on a computer’s hardware-specific MAC address, which is relatively simple to be sniffed out and stolen. EAP is built on a more secure public-key encryption system to ensure that only authorized network users can access the network. WPA-PSK/WPA2-PSK uses a passphrase or key to authenticate your wireless connection. The key is an alpha-numeric password between 8 and 63 characters long. The password can include symbols (!?*&_) and spaces. This key must be the exact same key entered on your wireless router or access point. WPA/WPA2 incorporates user authentication through the Extensible Authentication Protocol (EAP). EAP is built on a more secure public key encryption system to ensure that only authorized network users can access the network. D-Link DIR-655 User Manual 66
Section 4 - Security Wireless Security Setup Wizard To run the security wizard, click on Setup at the top and then click Launch Wireless Security Setup Wizard. Select how you would like to configure your wireless security settings: Auto - Allows the router to auto-generate Wireless Network Name (SSID) and WPA-Personal Passphrase. Click Save to apply the auto-generated settings. Manual - Allows you to go through the Wireless Security Setup Wizard and enter your settings manually. Click Next to continue. D-Link DIR-655 User Manual 67
- Page 16 and 17: Section 3 - Configuration If you se
- Page 18 and 19: Section 3 - Configuration My Intern
- Page 20 and 21: Section 3 - Configuration MTU: MAC
- Page 22 and 23: Section 3 - Configuration MTU: Clon
- Page 24 and 25: Section 3 - Configuration Internet
- Page 26 and 27: Section 3 - Configuration Channel W
- Page 28 and 29: Section 3 - Configuration Enable DH
- Page 30 and 31: Section 3 - Configuration Virtual S
- Page 32 and 33: Section 3 - Configuration Port Forw
- Page 34 and 35: Section 3 - Configuration QoS Engin
- Page 36 and 37: Section 3 - Configuration Network F
- Page 38 and 39: Section 3 - Configuration Enter a n
- Page 40 and 41: Section 3 - Configuration Website U
- Page 42 and 43: Section 3 - Configuration A firewal
- Page 44 and 45: Section 3 - Configuration Router Se
- Page 46 and 47: Section 3 - Configuration WISH Sett
- Page 48 and 49: Section 3 - Configuration Wi-Fi Pro
- Page 50 and 51: UPnP Internet Ping Block Internet P
- Page 52 and 53: Section 3 - Configuration Time Sett
- Page 54 and 55: Section 3 - Configuration Email Set
- Page 56 and 57: Section 3 - Configuration Update Fi
- Page 58 and 59: Section 3 - Configuration System Ch
- Page 60 and 61: Section 3 - Configuration Device In
- Page 62 and 63: Section 3 - Configuration Statistic
- Page 64 and 65: Section 3 - Configuration Support D
- Page 68 and 69: Section 4 - Security Enter the SSID
- Page 70 and 71: Section 4 - Security Configure WEP
- Page 72 and 73: Section 4 - Security Configure WPA-
- Page 74 and 75: Section 5 - Connecting to a Wireles
- Page 76 and 77: Section 5 - Connecting to a Wireles
- Page 78 and 79: Section 5 - Connecting to a Wireles
- Page 80 and 81: Section 6 - Troubleshooting • Con
- Page 82 and 83: Section 6 - Troubleshooting You sho
- Page 84 and 85: Appendix A - Wireless Basics What i
- Page 86 and 87: Appendix A - Wireless Basics Where
- Page 88 and 89: Appendix B - Networking Basics Netw
- Page 90: Appendix C - Technical Specificatio
Section 4 - Security<br />
What is WPA?<br />
WPA, or Wi-Fi Protected Access, is a Wi-Fi standard that was designed to improve the security features of WEP (Wired<br />
Equivalent Privacy).<br />
The 2 major improvements over WEP:<br />
• Improved data encryption through the Temporal Key Integrity Protocol (TKIP). TKIP scrambles the keys<br />
using a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys haven’t<br />
been tampered with. WPA2 is based on 802.11i and uses Advanced Encryption Standard (AES) instead<br />
of TKIP.<br />
• User authentication, which is generally missing in WEP, through the extensible authentication protocol<br />
(EAP). WEP regulates access to a wireless network based on a computer’s hardware-specific MAC<br />
address, which is relatively simple to be sniffed out and stolen. EAP is built on a more secure public-key<br />
encryption system to ensure that only authorized network users can access the network.<br />
WPA-PSK/WPA2-PSK uses a passphrase or key to authenticate your wireless connection. The key is an alpha-numeric<br />
password between 8 and 63 characters long. The password can include symbols (!?*&_) and spaces. This key must<br />
be the exact same key entered on your wireless router or access point.<br />
WPA/WPA2 incorporates user authentication through the Extensible Authentication Protocol (EAP). EAP is built on a<br />
more secure public key encryption system to ensure that only authorized network users can access the network.<br />
D-Link DIR-655 User Manual<br />
66