Solved

Different types of wireless secutiry

Posted on 2007-03-29
3
415 Views
Last Modified: 2008-02-07
Can someone please tell me the difference between these, and what is best (any why)?

WPA-PSK (TKIP)
WPA2-PSK (AES)
WPA-PSK (TKIP) + WPA2-PSK (AES)

0
Comment
Question by:qwertq
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 6

Accepted Solution

by:
mattyfonz earned 250 total points
ID: 18821040
what environment are you using it for? home or in an office or corporate network?
if at home id use wpa2-psk (AES) as it is the strongest form of security among those you have listed

According to http://forum.bsr-clan.de/ftopic1715.html
There are three (3) available encryption types to use with WPA. The first one is TKIP and currently the most common. The second one is AES, and currently the strongest type of encryption offered for non RADIUS wireless networks.  third is TKIP+AES which is a merge of both encryption types, but slightly weaker then AES alone. "AES" is the recommended setting if all wireless clients support it.

i agree with the poster.
0
 

Author Comment

by:qwertq
ID: 18821104
its just home.
i was using just mac filtering and hidden network. but that just is not secure.

i will change to your reccomendation.

also, on my macbook. when i connect to a network it has these as security options:

WEP Password
WEP 40/128-bit Hex
WEP 40/128-bit ASCII
LEAP
WPA Personal
WPA Enterprise
WPA2 Personal
WPA2 Enterprise
802.1x WEP

Do i select WPA2 Personal?  
0
 
LVL 6

Expert Comment

by:mattyfonz
ID: 18821252
yes WPA2 Personal is WPA2 AES
you can leave the other security you have set in place as it offers multiple layers of security
eg: a hacker would have to:
discover your hidden SSID
spoof your MAC
crack WPA2 to get onto your network
granted the first 2 arent very difficult but it acts as a deterrent to the casual snooper as opposed to a determined hacker :)
0

Featured Post

Are Your IoT Devices Out to Get You?

IoT business is booming, with manufacturers connecting any and every “thing” to the Internet. But as pressure grows to release new products faster and faster, we’re all left to wonder: is security a priority? Join our webinar on June 29th for the answer.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In the hope of saving someone else's sanity... About a year ago we bought a Cisco 1921 router with two ADSL/VDSL EHWIC cards to load balance local network traffic over the two broadband lines we have, but we couldn't get the routing to work consi…
In this article we have discussed about the OS X EI Capitan and how to fix Wi-Fi issue in OS X El Capitan. We have explained how to delete system level preferences and create a new Wi-Fi location to resolve Wi-Fi issue.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Suggested Courses

695 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question