Solved

Different types of wireless secutiry

Posted on 2007-03-29
3
414 Views
Last Modified: 2008-02-07
Can someone please tell me the difference between these, and what is best (any why)?

WPA-PSK (TKIP)
WPA2-PSK (AES)
WPA-PSK (TKIP) + WPA2-PSK (AES)

0
Comment
Question by:qwertq
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 6

Accepted Solution

by:
mattyfonz earned 250 total points
ID: 18821040
what environment are you using it for? home or in an office or corporate network?
if at home id use wpa2-psk (AES) as it is the strongest form of security among those you have listed

According to http://forum.bsr-clan.de/ftopic1715.html
There are three (3) available encryption types to use with WPA. The first one is TKIP and currently the most common. The second one is AES, and currently the strongest type of encryption offered for non RADIUS wireless networks.  third is TKIP+AES which is a merge of both encryption types, but slightly weaker then AES alone. "AES" is the recommended setting if all wireless clients support it.

i agree with the poster.
0
 

Author Comment

by:qwertq
ID: 18821104
its just home.
i was using just mac filtering and hidden network. but that just is not secure.

i will change to your reccomendation.

also, on my macbook. when i connect to a network it has these as security options:

WEP Password
WEP 40/128-bit Hex
WEP 40/128-bit ASCII
LEAP
WPA Personal
WPA Enterprise
WPA2 Personal
WPA2 Enterprise
802.1x WEP

Do i select WPA2 Personal?  
0
 
LVL 6

Expert Comment

by:mattyfonz
ID: 18821252
yes WPA2 Personal is WPA2 AES
you can leave the other security you have set in place as it offers multiple layers of security
eg: a hacker would have to:
discover your hidden SSID
spoof your MAC
crack WPA2 to get onto your network
granted the first 2 arent very difficult but it acts as a deterrent to the casual snooper as opposed to a determined hacker :)
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

In the world of WAN, QoS is a pretty important topic for most, if not all, networks. Some WAN technologies have QoS mechanisms built in, but others, such as some L2 WAN's, don't have QoS control in the provider cloud.
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

749 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question