User's Manual
Table Of Contents
- Product Overview
- Installation
- Configuration
- Access Point Mode
- Wireless Client Mode
- Router Mode
- Setup Wizard
- Internet Setup
- Wireless Setup Wizard
- Wireless Settings
- Network Settings
- USB Settings
- Virtual Server
- Application Rules
- MAC Address Filter
- Website Filters
- Firewall Settings
- Advanced Wireless Settings
- Wi-Fi Protected Setup
- UPnP Settings
- Guest Zone
- DMZ
- IPV6 Settings
- Administrator Settings
- Time Settings
- System Settings
- Firmware Update
- System Check
- Schedules
- Device Information
- Wireless
- Logs
- Statistics
- Internet Sessions
- IPv6
- Help
- Wireless Security
- Connect to a Wireless Network
- Troubleshooting
- Wireless Basics
- Networking Basics
- Technical Specifications
- Warranty
117D-Link DAP-1350 User Manual
Section 4 - Security
What is WPA?
WPA, or Wi-Fi Protected Access, is a Wi-Fi standard that was designed to improve the security features of WEP (Wired Equivalent
Privacy).
The 2 major improvements over WEP:
• Improved data encryption through the Temporal Key Integrity Protocol (TKIP). TKIP scrambles the keys using a
hashing algorithm and, by adding an integrity-checking feature, ensures that the keys haven’t been tampered
with. WPA2 is based on 802.11i and uses Advanced Encryption Standard (AES) instead of TKIP.
• User authentication, which is generally missing in WEP, through the extensible authentication protocol (EAP).
WEP regulates access to a wireless network based on a computer’s hardware-specic MAC address, which is
relatively simple to be snied out and stolen. EAP is built on a more secure public-key encryption system to
ensure that only authorized network users can access the network.
WPA-PSK/WPA2-PSK uses a passphrase or key to authenticate your wireless connection. The key is an alpha-numeric password
between 8 and 63 characters long. The password can include symbols (!?*&_) and spaces. This key must be the exact same key
entered on your wireless bridge or access point.
WPA/WPA2 incorporates user authentication through the Extensible Authentication Protocol (EAP). EAP is built on a more
secure public key encryption system to ensure that only authorized network users can access the network.