Page 46 / 83 Scroll up to view Page 41 - 45
³6
D-Link DIR-615 User Manual
Section ² - Configuration
Support
The wireless client table displays a list of current connected wireless clients. This table also displays the connection
time and MAC address of the connected wireless clients.
Wireless
Page 47 / 83
³´
D-Link DIR-615 User Manual
Section ³ - Security
Wireless Security
This section will show you the different levels of security you can use to protect your data from intruders. The
DIR-615 offers the following types of security:
• WPA2 (Wi-Fi Protected Access 2)
• WPA2-PSK (Pre-Shared Key)
• WPA (Wi-Fi Protected Access)
• WPA-PSK (Pre-Shared Key)
• WEP (Wired Equivalent Privacy)
What is WEP?
WEP stands for Wired Equivalent Privacy. It is based on the IEEE 802.11 standard and uses the RC4 encryption
algorithm. WEP provides security by encrypting data over your wireless network so that it is protected as it is transmitted
from one wireless device to another.
To gain access to a WEP network, you must know the key. The key is a string of characters that you create. When using
WEP, you must determine the level of encryption. The type of encryption determines the key length. 128-bit encryption
requires a longer key than 64-bit encryption. Keys are defined by entering in a string in HEX (hexadecimal - using
characters 0-9, A-F) or ASCII (American Standard Code for Information Interchange – alphanumeric characters) format.
ASCII format is provided so you can enter a string that is easier to remember. The ASCII string is converted to HEX
for use over the network. Four keys can be defined so that you can change keys easily.
Page 48 / 83
³µ
D-Link DIR-615 User Manual
Section ³ - Security
What is WPA?
WPA, or Wi-Fi Protected Access, is a Wi-Fi standard that was designed to improve the security features of WEP (Wired
Equivalent Privacy).
The 2 major improvements over WEP:
• Improved data encryption through the Temporal Key Integrity Protocol (TKIP). TKIP scrambles the keys
using a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys haven’t
been tampered with. WPA2 is based on 802.11i and uses Advanced Encryption Standard (AES) instead
of TKIP.
• User authentication, which is generally missing in WEP, through the extensible authentication protocol
(EAP). WEP regulates access to a wireless network based on a computer’s hardware-specific MAC
address, which is relatively simple to be sniffed out and stolen. EAP is built on a more secure public-key
encryption system to ensure that only authorized network users can access the network.
WPA-PSK/WPA2-PSK uses a passphrase or key to authenticate your wireless connection. The key is an alpha-numeric
password between 8 and 63 characters long. The password can include symbols (!?*&_) and spaces. This key must
be the exact same key entered on your wireless router or access point.
WPA/WPA2 incorporates user authentication through the Extensible Authentication Protocol (EAP). EAP is built on a
more secure public key encryption system to ensure that only authorized network users can access the network.
Page 49 / 83
³¶
D-Link DIR-615 User Manual
Section ³ - Security
Wireless Security Setup Wizard
To run the security wizard, click on Setup at the top and then
click
Launch Wireless Security Setup Wizard
.
Click
Next
to continue.
Page 50 / 83
50
D-Link DIR-615 User Manual
Section ³ - Security
Enter the SSID (Service Set Identifier). The SSID is the
name of your wireless network. Create a name using up to
32 characters. The SSID is case-sensitive.
Select the level of security for your wireless network:
• Best - WPA2 Authentication
• Better - WPA Authentication
• Good - WEP Encryption
• None - No security
Click
Next
to continue.
If you selected Best or Better, enter a password between
8-63 characters.
Click
Next
to continue.
If you selected Good, enter a WEP encryption key (13
characters or 26 Hex (A-F, 0-9) characters).
Click
Next
to continue.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top