Wireless-G Broadband Router with 2 Phone Ports
90
Appendix B: Wireless Security
Security Threats Facing Wireless Networks
along with a key shared between the device and the server. Last, enter a Group Key Renewal period, which
instructs the device how often it should change the encryption keys.
Implementing encryption may have a negative impact on your network’s performance, but if you are transmitting
sensitive data over your network, encryption should be used.
These security recommendations should help keep your mind at ease while you are enjoying the most flexible
and convenient technology Linksys has to offer.