User's Manual
Table Of Contents
- Preface
- Product Overview
- Installation
- Configuration
- Web-based Configuration Utility
- Setup Wizard
- Manual Configuration
- Internet Setup
- Wireless Settings
- Network Settings
- Media Server
- IPv6 Internet Connection
- IPv6 Manual Setup
- Auto Detection
- Static IPv6 (Stateful)
- Static IPv6 (Stateless)
- Autoconfiguration (Stateful)
- Autoconfiguration (Stateless)
- PPPoE (Stateful)
- PPPoE (Stateless)
- IPv6 in IPv4 Tunneling (Stateful)
- IPv6 in IPv4 Tunneling (Stateless)
- 6 to 4 Tunneling (Stateful)
- 6 to 4 Tunneling (Stateless)
- 6rd (Stateless)
- 6rd (Stateful)
- Link-Local Connectivity
- Parental Controls
- Virtual Server
- Port Forwarding
- Application Rules
- QoS Engine
- Network Filters
- Access Control
- Website Filters
- Inbound Filters
- Firewall Settings
- Application Level Gateway Configuration
- Routing
- Advanced Wireless Settings
- WISH Settings
- Wi-Fi Protected Setup (WPS)
- Advanced Network Settings
- Guest Zone
- IPv6 Firewall
- IPv6 Routing
- Administrator Settings
- Time Settings
- SysLog
- Email Settings
- System Settings
- Update Firmware
- DDNS
- System Check
- Schedules
- Device Information
- Log
- Stats
- Active Sessions
- Wireless
- IPv6
- Support
- Web-based Configuration Utility
- Wireless Security
- Connect to a Wireless Network
- Troubleshooting
- Wireless Basics
- Networking Basics
- Technical Specifications
- Contacting Technical Support
- Warranty
- Registration
82D-Link DIR-657 User Manual
Section 4 - Security
Wireless Security
This section will show you the dierent levels of security you can use to protect your data from intruders. The DIR-657 oers the following types
of security:
• WPA2
™
(Wi-Fi Protected Access 2) • WPA2-PSK (Pre-Shared Key)
• WPA
™
(Wi-Fi Protected Access) • WPA-PSK (Pre-Shared Key)
What is WPA?
WPA, or Wi-Fi Protected Access, is a Wi-Fi standard that was designed to improve the security features of WEP (Wired Equivalent Privacy).
The 2 major improvements over WEP:
• Improved data encryption through the Temporal Key Integrity Protocol (TKIP). TKIP scrambles the keys using a hashing algorithm
and, by adding an integrity-checking feature, ensures that the keys haven’t been tampered with. WPA2 is based on 802.11i and
uses Advanced Encryption Standard (AES) instead of TKIP.
• User authentication, which is generally missing in WEP, through the extensible authentication protocol (EAP). WEP regulates
access to a wireless network based on a computer’s hardware-specic MAC address, which is relatively simple to be snied out
and stolen. EAP is built on a more secure public-key encryption system to ensure that only authorized network users can access
the network.
WPA-PSK/WPA2-PSK uses a passphrase or key to authenticate your wireless connection. The key is an alpha-numeric password between 8 and 63
characters long. The password can include symbols (!?*&_) and spaces. This key must be the exact same key entered on your wireless router or
access point.
WPA/WPA2 incorporates user authentication through the Extensible Authentication Protocol (EAP). EAP is built on a more secure public key encryption
system to ensure that only authorized network users can access the network.