Introduction to youxun route encryption method WPA

Source: Internet
Author: User


Youxun's route encryption method WPA is a common wireless network encryption method. It is a protocol and algorithm used to improve the security of keys used by WEP. It changes the key generation method, most wireless network password cracking software can't do anything about WPA encryption. It also adds the message integrity check function to prevent packet forgery. I. Application of WPA 1. Because the complete WPA operation process is relatively difficult, very complex, relatively difficult to achieve in life, so in the home network is the simplified version of WPA WPA-PSK, the Chinese character is the pre-shared key. 2. log on to the youxun router and click Wireless Parameters-Basic settings in the left-side navigation bar. Www.2cto.com

You can select the default status for the SSID, channel, and band bandwidth. You must check the wireless function before enabling the wireless function. If you are familiar with SSID broadcasting, you can skip this step, increase wireless network security, but for average people, please tick, otherwise the laptop will not be able to find wireless signals. 3. Click wireless security settings-select WPA-PSK/WPA2-PSK.

(1) authentication type: automatic selection, WPA-PSK, WPA2-PSK, the three are basically no difference. (2) encryption algorithm: automatic selection, TKIP, and AES. We recommend that you use the AES encryption algorithm. If you select TKIP, the following interface is displayed, it is prompted that the wireless transmission performance will decrease in this encryption mode, so we recommend that you select automatic or AES. Www.2cto.com

4. Here, the wireless route security configuration is basically complete, and you only need to restart the router to complete the configuration. Ii. WPA features 1. The previous wireless networks were not secure because of some shortcomings in the standard encryption technology WEP. The cracking software can obtain the wireless network password through injection attacks, the function of WPA is to replace the existing WEP protocol. 2. WPA adds functions and authentication functions to prevent data tampering in the middle. Due to these features, all of the shortcomings previously criticized by WEP can be solved. 3. WPA inherits the basic principles of WEP and solves the disadvantages of WEP. Due to its enhanced Algorithm for generating encryption keys, therefore, even if the handshake packet information is collected and parsed, the key cannot be calculated.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.