Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win


Wireless Router

Posted on 2011-03-02
Medium Priority
Last Modified: 2012-05-11
I have a Linksys Wireless Router. I don't understand the following. Could someone explain what are the different Security Modes and WPA Algorithms please.

Which is the best type of Security mode and how does one choose which particular one to use?

Security Mode:
WPA2 Pre-Shared Key Mixed
WPA2 Pre-Shared Key Only
WPA2 Radius Only
WPA2 Radius Mixed
WPA Pre-Shared Key

And which WPA Alogrithms should one choose and which is the best and most secure to use?

WPA Algorithms:
Question by:ben1211
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions

Expert Comment

ID: 35015137
Is this for a enterprise or for home use ?

Assisted Solution

NotVeryFat earned 400 total points
ID: 35015670

Assisted Solution

mi-sir earned 400 total points
ID: 35015806
Wireless encryption protocol evolution was following
WEP was first is not recommend to use it as security is very weak
WPA more secure and was replaced by WPA2 most secure  best option
So for sure you should choose WPA2

WPA2 is having two main favous
1) for home or small office is used PRE-SHARED version.. you just specify pass phrase on access point and you will use same on client

2) Enteprise version - you need dedicated server communicating with access point for user authentication

WPA2 Pre-Shared Key Mixed
In mixed mode, the unit tries wpa2 first and if its fails it uses wpa1

WPA2 Pre-Shared Key Only
Most widely  implemented for SOHO you dont need any additional server
WPA2 Radius Only
you need dedicated sever running radius .. its good if you have hundreds of users

AES  uses stronger algorithm than TKIP and is more secure
AES+TKIP  I think is not standard  and its implemented by some vendors.. a some clients may not support it..  I would go for AES its secure enough

Veeam Task Manager for Hyper-V

Task Manager for Hyper-V provides critical information that allows you to monitor Hyper-V performance by displaying real-time views of CPU and memory at the individual VM-level, so you can quickly identify which VMs are using host resources.

LVL 47

Accepted Solution

Craig Beck earned 1200 total points
ID: 35016613
Just to add to what mi-sir said...

AES + TKIP means that WPA2 can use either AES or TKIP algorithms to secure communication to the client.
This would allow you to have some clients connected using WPA2/AES and WPA2/TKIP.

Author Comment

ID: 35069356
Guys thank you for the explanation, but honestly, I still do not understand what has been said.

"AES + TKIP means that WPA2 can use either AES or TKIP algorithms to secure communication to the client."

What does AES and TKIP and WPA2 actually mean?

Be it its for home or work use, I need assistance in understanding what these "words" mean and how do they provide better security?
LVL 47

Assisted Solution

by:Craig Beck
Craig Beck earned 1200 total points
ID: 35069458
WPA2 is the encryption protocol - how the router 'hides' the data.
TKIP and AES are encryption algorithms, (so in its simplest form) how 'thorough' the encryption is.

TKIP is 128-bit, and AES is 256-bit.  Therefore AES is more secure than TKIP.
Some hardware vendors only support AES when used with WPA2, not WPA1.

WPA1 and WPA2 are more secure than WEP.

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In the world of WAN, QoS is a pretty important topic for most, if not all, networks. Some WAN technologies have QoS mechanisms built in, but others, such as some L2 WAN's, don't have QoS control in the provider cloud.
This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Suggested Courses

609 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question