Youxun's route encryption method WPA is a common wireless network encryption method. It is a protocol and algorithm used to improve the security of keys used by WEP. It changes the key generation method, most wireless network password cracking software can't do anything about WPA encryption. It also adds the message integrity check function to prevent packet forgery. I. Application of WPA 1. Because the complete WPA operation process is relatively difficult, very complex, relatively difficult to achieve in life, so in the home network is the simplified version of WPA WPA-PSK, the Chinese character is the pre-shared key. 2. log on to the youxun router and click Wireless Parameters-Basic settings in the left-side navigation bar. Www.2cto.com
You can select the default status for the SSID, channel, and band bandwidth. You must check the wireless function before enabling the wireless function. If you are familiar with SSID broadcasting, you can skip this step, increase wireless network security, but for average people, please tick, otherwise the laptop will not be able to find wireless signals. 3. Click wireless security settings-select WPA-PSK/WPA2-PSK.
(1) authentication type: automatic selection, WPA-PSK, WPA2-PSK, the three are basically no difference. (2) encryption algorithm: automatic selection, TKIP, and AES. We recommend that you use the AES encryption algorithm. If you select TKIP, the following interface is displayed, it is prompted that the wireless transmission performance will decrease in this encryption mode, so we recommend that you select automatic or AES. Www.2cto.com
4. Here, the wireless route security configuration is basically complete, and you only need to restart the router to complete the configuration. Ii. WPA features 1. The previous wireless networks were not secure because of some shortcomings in the standard encryption technology WEP. The cracking software can obtain the wireless network password through injection attacks, the function of WPA is to replace the existing WEP protocol. 2. WPA adds functions and authentication functions to prevent data tampering in the middle. Due to these features, all of the shortcomings previously criticized by WEP can be solved. 3. WPA inherits the basic principles of WEP and solves the disadvantages of WEP. Due to its enhanced Algorithm for generating encryption keys, therefore, even if the handshake packet information is collected and parsed, the key cannot be calculated.