54D-Link DCH-M225 User Manual
Appendix C - Wireless Security
Wireless Security Options
What is the best way to secure your wireless computer network? There are several security protocols with various versions from
which to choose. Depending on the wireless device, you may have to select from dierent levels of security. The description
of security protocols, encryption and authentication that follows is intended to help you better understand your choices.
WPA ( Wi-Fi Protected Access) and WPA2 (Wi-Fi Protected Access II ) are two security protocols that were developed by the Wi-Fi Alliance (WFA)
to replace the less-secure WEP (Wired Equivalent Privacy). The WFA is a trade association that certies Wi-Fi® products that are compliant with
standards of interoperability. IEEE 802.11 is the set of specications for implementing WLAN (Wireless Local Area Network) computer communication
within the 2.4 to 5GHZ frequency bands. WLAN typically provides a connection between wireless devices to the Internet using an AP (access point).
WPA was originally referred to as the draft IEEE 802.11i standard, since it became available rst, and was intended as an intermediate solution
pending the availability of a full IEEE 802.11i standard. WPA2 was known as IEEE 802.11i-2004, the year it rst became available. Wi-Fi devices that
have been certied since 2006 generally support both WPA and WPA2.
WPS (Wi-Fi Protected Setup™) provides the easiest way to establish a secure wireless network for home or small oce (SOHO) environments.
Introduced in 2007, WPS was created by WFA so that users who might otherwise be intimidated by the available security options could set up a
secure network, and later add new devices, with a simple automated process. PBC (Push Button Conguration) requires just the push of a button.
Today most wireless devices, from routers to wireless printers and cameras, have a WPS button. WPS enables WPA2 security protocol.
Security Protocols