Page 76 / 112 Scroll up to view Page 71 - 75
µ6
D-Link DIR-6±8 User Manual
Section ² - Configuration
The wireless client table will assist you in your wireles network setup and wireless device connection. Click
Wireless.
Network.Setup.Wizard.
to begin.
Wireless
Page 77 / 112
µµ
D-Link DIR-6±8 User Manual
Section ² - Configuration
Give your network a name. You may use up to
32 characters. Next, choose to automatically
assign a network key or to have one manually
assign. Click
Next
to continue.
Page 78 / 112
µ8
D-Link DIR-6±8 User Manual
Section ² - Configuration
Support
Page 79 / 112
µ¶
D-Link DIR-6±8 User Manual
Section ³ - Security
Wireless Security
This section will show you the different levels of security you can use to protect your data from intruders. The DIR-628
offers the following types of security:
• WPA2 (Wi-Fi Protected Access 2)
• WPA2-PSK (Pre-Shared Key)
• WPA (Wi-Fi Protected Access)
• WPA-PSK (Pre-Shared Key)
What is WPA?
WPA, or Wi-Fi Protected Access, is a Wi-Fi standard that was designed to improve the security features of WEP (Wired
Equivalent Privacy).
The 2 major improvements over WEP:
• Improved data encryption through the Temporal Key Integrity Protocol (TKIP). TKIP scrambles the keys
using a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys haven’t
been tampered with. WPA2 is based on 802.11i and uses Advanced Encryption Standard (AES) instead
of TKIP.
• User authentication, which is generally missing in WEP, through the extensible authentication protocol
(EAP). WEP regulates access to a wireless network based on a computer’s hardware-specific MAC
address, which is relatively simple to be sniffed out and stolen. EAP is built on a more secure public-key
encryption system to ensure that only authorized network users can access the network.
WPA-PSK/WPA2-PSK uses a passphrase or key to authenticate your wireless connection. The key is an alpha-numeric
password between 8 and 63 characters long. The password can include symbols (!?*&_) and spaces. This key must
be the exact same key entered on your wireless router or access point.
WPA/WPA2 incorporates user authentication through the Extensible Authentication Protocol (EAP). EAP is built on a
more secure public key encryption system to ensure that only authorized network users can access the network.
Page 80 / 112
80
D-Link DIR-6±8 User Manual
Section ³ - Security
Wireless Network Setup Wizard
To run the security wizard, click on Setup at the top and then
click
Wireless.Network.Setup.Wizard
.
Type your desired wireless network name (SSID).
Automatically:.
Select this option to automatically
generate the router’s network key and click
Next
.
Manually:
Select this option to manually enter your
network key and click
Next
.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top