Draytek 2700 Guida Utente

Pagina di 190
 
Vigor2700 Series User’s Guide 
123
 
S
S
e
e
c
c
u
u
r
r
i
i
t
t
y
y
 
 
O
O
v
v
e
e
r
r
v
v
i
i
e
e
w
w
 
 
Real-time Hardware Encryption: Vigor Router is equipped with a hardware AES encryption 
engine so it can apply the highest protection to your data without influencing user experience. 
Complete Security Standard Selection: To ensure the security and privacy of your wireless 
communication, we provide several prevailing standards on market. 
WEP (Wired Equivalent Privacy) is a legacy method to encrypt each frame transmitted via 
radio using either a 64-bit or 128-bit key. Usually access point will preset a set of four keys 
and it will communicate with each station using only one out of the four keys. 
WPA (Wi-Fi Protected Access), the most dominating security mechanism in industry, is 
separated into two categories: WPA-personal or called WPA Pre-Share Key (WPA/PSK), and 
WPA-Enterprise or called WPA/802.1x. 
In WPA-Personal, a pre-defined key is used for encryption during data transmission. WPA 
applies Temporal Key Integrity Protocol (TKIP) for data encryption while WPA2 applies AES. 
The WPA-Enterprise combines not only encryption but also authentication. 
Since WEP has been proved vulnerable, you may consider using WPA for the most secure 
connection. You should select the appropriate security mechanism according to your needs. 
No matter which security suite you select, they all will enhance the over-the-air data 
protection and /or privacy on your wireless network. The Vigor wireless router is very flexible 
and can support multiple secure connections with both WEP and WPA at the same time. 
Example 1