?
Solved

Different types of wireless secutiry

Posted on 2007-03-29
3
Medium Priority
?
416 Views
Last Modified: 2008-02-07
Can someone please tell me the difference between these, and what is best (any why)?

WPA-PSK (TKIP)
WPA2-PSK (AES)
WPA-PSK (TKIP) + WPA2-PSK (AES)

0
Comment
Question by:qwertq
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 6

Accepted Solution

by:
mattyfonz earned 1000 total points
ID: 18821040
what environment are you using it for? home or in an office or corporate network?
if at home id use wpa2-psk (AES) as it is the strongest form of security among those you have listed

According to http://forum.bsr-clan.de/ftopic1715.html
There are three (3) available encryption types to use with WPA. The first one is TKIP and currently the most common. The second one is AES, and currently the strongest type of encryption offered for non RADIUS wireless networks.  third is TKIP+AES which is a merge of both encryption types, but slightly weaker then AES alone. "AES" is the recommended setting if all wireless clients support it.

i agree with the poster.
0
 

Author Comment

by:qwertq
ID: 18821104
its just home.
i was using just mac filtering and hidden network. but that just is not secure.

i will change to your reccomendation.

also, on my macbook. when i connect to a network it has these as security options:

WEP Password
WEP 40/128-bit Hex
WEP 40/128-bit ASCII
LEAP
WPA Personal
WPA Enterprise
WPA2 Personal
WPA2 Enterprise
802.1x WEP

Do i select WPA2 Personal?  
0
 
LVL 6

Expert Comment

by:mattyfonz
ID: 18821252
yes WPA2 Personal is WPA2 AES
you can leave the other security you have set in place as it offers multiple layers of security
eg: a hacker would have to:
discover your hidden SSID
spoof your MAC
crack WPA2 to get onto your network
granted the first 2 arent very difficult but it acts as a deterrent to the casual snooper as opposed to a determined hacker :)
0

Featured Post

 [eBook] Windows Nano Server

Download this FREE eBook and learn all you need to get started with Windows Nano Server, including deployment options, remote management
and troubleshooting tips and tricks

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In the modern office, employees tend to move around the workplace a lot more freely. Conferences, collaborative groups, flexible seating and working from home require a new level of mobility. Technology has not only changed the behavior and the expe…
DECT technology has become a popular standard for wireless voice communication. DECT devices are not likely to be affected by other electronic devices and signals because they operate in a separate frequency-band.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Suggested Courses

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question