D-Link M32-2, M32-3 EAGLE PRO AI AX3200 Mesh System

User Manual - Page 137

For M32-2, M32-3.

PDF File Manual, 159 pages, Read Online | Download pdf file

M32-2, M32-3 photo
Loading ...
Loading ...
Loading ...
133D-Link M32 User Manual
Appendix D - Wireless Security
Wireless Security
This section will show you the dierent levels of encryption you can use to better protect your data from intruders. The router
oers the following types of security protocols:
WPA3 (Wi-Fi Protected Access 3) WPA2 (Wi-Fi Protected Access 2)
WPA2-PSK (Pre-Shared Key) WPA (Wi-Fi Protected Access)
WPA-PSK (Pre-Shared Key)
What is WPA?
WPA (Wi-Fi Protected Access), is a Wi-Fi standard that was designed to improve the security features of WEP (Wired Equiva-
lent Privacy).
The 2 major improvements over WEP:
Improved data encryption through the Temporal Key Integrity Protocol (TKIP). TKIP scrambles the keys using a
hashing algorithm and by adding an integrity-checking feature, ensures that the keys haven’t been tampered
with. WPA2 is based on 802.11i and uses Advanced Encryption Standard (AES) instead of TKIP.
User authentication, which is generally missing in WEP, through the extensible authentication protocol (EAP). WEP
regulates access to a wireless network based on a computers hardware-specic MAC address, which is relatively
simple to be snied out and stolen. EAP is built on a more secure public-key encryption system to ensure that
only authorized network users can access the network.
WPA-PSK/WPA2-PSK/WPA3-SAE uses a passphrase or key to authenticate your wireless connection. The key is an alpha-nu-
meric password between 8 and 63 characters long. The password can include symbols (!?*&_) and spaces. This key must be
the exact same key entered on your wireless router or access point.
WPA/WPA2 incorporates user authentication through the Extensible Authentication Protocol (EAP). EAP is built on a more
secure public key encryption system to ensure that only authorized network users can access the network.
WPA3 has the strongest encryption among these with the increased cryptographic capability and the requirements of the
Protected Management Frames (PMFs) to help protect from snooping attack.
Loading ...
Loading ...
Loading ...