742883
95
Zoom out
Zoom in
Previous page
1/178
Next page
88
Name
Description
medium. If the wireless network is not protected by necessary measures, any client
can connect to the network to use the resources of the network or access
unprotected data over the network. To ensure communication security,
transmission links of wireless networks must be encrypted for protection.
The device supports various security modes for network encryption, including None,
WEP, WPA-PSK, WPA2-PSK, Mixed WPA/WPA2-PSK, WPA, and WPA2.
None: It indicates that any wireless client can connect to the wireless network.
This option is not recommended because it affects network security.
WEP: It uses a static key to encrypt all exchanged data, and ensures that a wireless
LAN has the same level of security as a wired LAN. Data encrypted based on WEP
can be easily cracked. In addition, WEP supports a maximum wireless network
throughput of only 54 Mbps. Therefore, this security mode is not recommended.
WPA-PSK/WPA2-PSK/Mixed WPA/WPA2-PSK: They belong to pre-shared key or
personal key modes, where Mixed WPA/WPA2-PSK supports both WPA-PSK and
WPA2-PSK.
WPA-PSK, WPA2-PSK, and Mixed WPA/WPA2-PSK adopt a pre-shared key for
authentication, while the AP generates another key for data encryption. This
prevents the vulnerability caused by static WEP keys, and makes the three
security modes suitable for ensuring security of home wireless networks.
Nevertheless, because the initial pre-shared key for authentication is manually
set and all clients use the same key to connect to the same AP, the key may be
disclosed unexpectedly. This makes the security modes not suitable for scenarios
where high security is required.
To address the key management weakness of WPA-PSK and WPA2-PSK, the WiFi
Alliance puts forward WPA and WPA2, which use 802.1x to authenticate clients
and generate data encryptionoriented root keys. WPA and WPA2 use the root
keys to replace the pre-shared keys that set manually, but adopt the same
encryption process as WPA-PSK and WPA2-PSK.
WPA/WPA2: WPA and WPA2 uses 802.1x to authenticate clients and the login
information of a client is managed by the client. This effectively reduces the
probability of information leakage. In addition, each time a client connects to an
AP that adopts the WPA or WPA2 security mode, the RADIUS server generates a
data encryption key and assigns it to the client. This makes it difficult for
attackers to obtain the key. These features of WPA and WPA2 help significantly
increase network security, making WPA and WPA2 the preferred security modes
of wireless networks that require high security.
Encryption Algorithm
It specifies the encryption algorithm corresponding to the selected security mode. If
Security Mode is set to WPA-PSK, this parameter has the AES and TKIP values. If
Security Mode is set to WPA2-PSK or Mixed WPA/WPA2-PSK, this parameter has the
AES, TKIP, and TKIP&AES values.
AES: It indicates the Advanced Encryption Standard.
TKIP: It indicates the Temporal Key Integrity Protocol. If TKIP is used, the maximum
wireless throughput of the AP is limited to 54 Mbps.
TKIP&AES: It indicates that both TKIP and AES encryption algorithms are
supported. Wireless clients can connect to the wireless network corresponding
to the selected SSID using TKIP or AES.
95


Need help? Post your question in this forum.

Forumrules


Report abuse

Libble takes abuse of its services very seriously. We're committed to dealing with such abuse according to the laws in your country of residence. When you submit a report, we'll investigate it and take the appropriate action. We'll get back to you only if we require additional details or have more information to share.

Product:

For example, Anti-Semitic content, racist content, or material that could result in a violent physical act.

For example, a credit card number, a personal identification number, or an unlisted home address. Note that email addresses and full names are not considered private information.

Forumrules

To achieve meaningful questions, we apply the following rules:

Register

Register getting emails for Tenda O4 at:


You will receive an email to register for one or both of the options.


Get your user manual by e-mail

Enter your email address to receive the manual of Tenda O4 in the language / languages: English as an attachment in your email.

The manual is 5,89 mb in size.

 

You will receive the manual in your email within minutes. If you have not received an email, then probably have entered the wrong email address or your mailbox is too full. In addition, it may be that your ISP may have a maximum size for emails to receive.

The manual is sent by email. Check your email

If you have not received an email with the manual within fifteen minutes, it may be that you have a entered a wrong email address or that your ISP has set a maximum size to receive email that is smaller than the size of the manual.

The email address you have provided is not correct.

Please check the email address and correct it.

Your question is posted on this page

Would you like to receive an email when new answers and questions are posted? Please enter your email address.



Info