Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Different types of wireless secutiry

Posted on 2007-03-29
3
413 Views
Last Modified: 2008-02-07
Can someone please tell me the difference between these, and what is best (any why)?

WPA-PSK (TKIP)
WPA2-PSK (AES)
WPA-PSK (TKIP) + WPA2-PSK (AES)

0
Comment
Question by:qwertq
  • 2
3 Comments
 
LVL 6

Accepted Solution

by:
mattyfonz earned 250 total points
ID: 18821040
what environment are you using it for? home or in an office or corporate network?
if at home id use wpa2-psk (AES) as it is the strongest form of security among those you have listed

According to http://forum.bsr-clan.de/ftopic1715.html
There are three (3) available encryption types to use with WPA. The first one is TKIP and currently the most common. The second one is AES, and currently the strongest type of encryption offered for non RADIUS wireless networks.  third is TKIP+AES which is a merge of both encryption types, but slightly weaker then AES alone. "AES" is the recommended setting if all wireless clients support it.

i agree with the poster.
0
 

Author Comment

by:qwertq
ID: 18821104
its just home.
i was using just mac filtering and hidden network. but that just is not secure.

i will change to your reccomendation.

also, on my macbook. when i connect to a network it has these as security options:

WEP Password
WEP 40/128-bit Hex
WEP 40/128-bit ASCII
LEAP
WPA Personal
WPA Enterprise
WPA2 Personal
WPA2 Enterprise
802.1x WEP

Do i select WPA2 Personal?  
0
 
LVL 6

Expert Comment

by:mattyfonz
ID: 18821252
yes WPA2 Personal is WPA2 AES
you can leave the other security you have set in place as it offers multiple layers of security
eg: a hacker would have to:
discover your hidden SSID
spoof your MAC
crack WPA2 to get onto your network
granted the first 2 arent very difficult but it acts as a deterrent to the casual snooper as opposed to a determined hacker :)
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Tired of waiting for your show or movie to load?  Are buffering issues a constant problem with your internet connection?  Check this article out to see if these simple adjustments are the solution for you.
In the world of WAN, QoS is a pretty important topic for most, if not all, networks. Some WAN technologies have QoS mechanisms built in, but others, such as some L2 WAN's, don't have QoS control in the provider cloud.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

839 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question