User Manual
Table Of Contents
- User Guide
- Table of Contents
- List of Figures
- Chapter 1: Introduction
- Chapter 2: Planning your Wireless Network
- Chapter 3: Getting to Know the Wireless-G Notebook Adapter
- Chapter 4: Software Installation and Configuration
- Chapter 5: Hardware Installation
- Chapter 6: Using the WLAN Monitor
- Appendix A: Troubleshooting
- Appendix B: Wireless Security
- Appendix C: Windows Help
- Appendix D: Glossary
- Appendix E: Specifications
- Appendix F: Warranty Information
- Appendix G: Regulatory Information
- Appendix H: Contact Information
35
Appendix B: Wireless Security
Security Threats Facing Wireless Networks
Wireless-G Notebook Adapter
WPA-PSK. If you do not have a RADIUS server, Select the type of algorithm, TKIP or AES, and enter a
password in the Passphrase field of 8-63 characters.
WPA RADIUS. WPA used in coordination with a RADIUS server. (This should only be used when a RADIUS
server is connected to the Router or other device.) WPA Radius offers two encryption methods, TKIP and AES,
with dynamic encryption keys.
RADIUS. WEP used in coordination with a RADIUS server. (This should only be used when a RADIUS server is
connected to the Router or other device.)
Implementing encryption may have a negative impact on your network’s performance, but if you are transmitting
sensitive data over your network, encryption should be used.
These security recommendations should help keep your mind at ease while you are enjoying the most flexible
and convenient technology Linksys has to offer.