Cisco Linksys Wireless-G WBP54GV2 Panduan Pengguna - Halaman 16
Jelajahi secara online atau unduh pdf Panduan Pengguna untuk Titik Akses Nirkabel Cisco Linksys Wireless-G WBP54GV2. Cisco Linksys Wireless-G WBP54GV2 50 halaman. Bridge for phone adapters
Wireless-G Bridge for Phone Adapters
9. Configure the wireless security settings. Select the method your network is using, WPA, WPA2, WEP (128-Bit),
or WEP (64-Bit). Then proceed to the appropriate instructions. If you are not using wireless security, select
Disabled, and proceed to step 10.
WPA
WPA automatically uses TKIP with dynamic encryption keys. Enter a passphrase on this screen.
Encryption - TKIP is automatically selected as the encryption method.
Passphrase - Enter a Passphrase, also called a pre-shared key, of 8-63 characters in the Passphrase field.
The longer and more complex your Passphrase is, the more secure your network will be.
Click Next to proceed, or click Back to return to the previous screen.
WPA2
WPA2 automatically uses AES with dynamic encryption keys (AES is a stronger encryption method than TKIP).
Enter a passphrase on this screen.
Encryption - AES is automatically selected as the encryption method.
Passphrase - Enter a Passphrase, also called a pre-shared key, of 8-63 characters in the Passphrase field.
The longer and more complex your Passphrase is, the more secure your network will be.
Click Next to proceed, or click Back to return to the previous screen.
Chapter 4: Setting Up and Connecting the Wireless-G Bridge for Phone Adapters
Running the Setup Wizard
encryption: encoding data transmitted in a network.
wpa (wi-fi protected access): a wireless security protocol
using TKIP (Temporal Key Integrity Protocol) encryption.
wpa2 (wi-fi protected access 2): a wireless security protocol
using AES (Advanced Encryption Standard) encryption.
wep (wired equivalent privacy): a method of encrypting network
data transmitted on a wireless network.
Figure 4-9: Security Settings - WPA Screen
Figure 4-10: Security Settings - WPA2 Screen
11