User Manual

The most effective encryption/authentication methods are part of the WPA (Wi-Fi Protected
Access) cipher suite and are recommended for all environments in which security is an important
consideration, whether in the enterprise, small office or home. WPA provides much more
complete protection against discovery of encryption keys than does the WEP standards. WPA
has progressed through two generations of encryption technology to date, with AES being the
latest and most effective. TKIP is the encryption protocol that was first introduced with WPA,
but it provides less comprehensive protection than does AES.
The original 802.11 wireless communication specification standard included WEP for wireless
security. Still widely used today, WEP security provides some security protection, but can be
vulnerable to attack. Use WEP in cases where the access point does not support higher level
security and security is a consideration in your network design.
.The WEP algorithm requires an encryption key or keys to be used in the encrypting and
decrypting of data.
Installation and User Guide: WFB400 Windows Wireless LAN Client Page 19 of 29