Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions

Wireless Router

Posted on 2011-03-02
Last Modified: 2012-05-11
I have a Linksys Wireless Router. I don't understand the following. Could someone explain what are the different Security Modes and WPA Algorithms please.

Which is the best type of Security mode and how does one choose which particular one to use?

Security Mode:
WPA2 Pre-Shared Key Mixed
WPA2 Pre-Shared Key Only
WPA2 Radius Only
WPA2 Radius Mixed
WPA Pre-Shared Key

And which WPA Alogrithms should one choose and which is the best and most secure to use?

WPA Algorithms:
Question by:ben1211

Expert Comment

ID: 35015137
Is this for a enterprise or for home use ?

Assisted Solution

NotVeryFat earned 100 total points
ID: 35015670

Assisted Solution

mi-sir earned 100 total points
ID: 35015806
Wireless encryption protocol evolution was following
WEP was first is not recommend to use it as security is very weak
WPA more secure and was replaced by WPA2 most secure  best option
So for sure you should choose WPA2

WPA2 is having two main favous
1) for home or small office is used PRE-SHARED version.. you just specify pass phrase on access point and you will use same on client

2) Enteprise version - you need dedicated server communicating with access point for user authentication

WPA2 Pre-Shared Key Mixed
In mixed mode, the unit tries wpa2 first and if its fails it uses wpa1

WPA2 Pre-Shared Key Only
Most widely  implemented for SOHO you dont need any additional server
WPA2 Radius Only
you need dedicated sever running radius .. its good if you have hundreds of users

AES  uses stronger algorithm than TKIP and is more secure
AES+TKIP  I think is not standard  and its implemented by some vendors.. a some clients may not support it..  I would go for AES its secure enough

Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

LVL 45

Accepted Solution

Craig Beck earned 300 total points
ID: 35016613
Just to add to what mi-sir said...

AES + TKIP means that WPA2 can use either AES or TKIP algorithms to secure communication to the client.
This would allow you to have some clients connected using WPA2/AES and WPA2/TKIP.

Author Comment

ID: 35069356
Guys thank you for the explanation, but honestly, I still do not understand what has been said.

"AES + TKIP means that WPA2 can use either AES or TKIP algorithms to secure communication to the client."

What does AES and TKIP and WPA2 actually mean?

Be it its for home or work use, I need assistance in understanding what these "words" mean and how do they provide better security?
LVL 45

Assisted Solution

by:Craig Beck
Craig Beck earned 300 total points
ID: 35069458
WPA2 is the encryption protocol - how the router 'hides' the data.
TKIP and AES are encryption algorithms, (so in its simplest form) how 'thorough' the encryption is.

TKIP is 128-bit, and AES is 256-bit.  Therefore AES is more secure than TKIP.
Some hardware vendors only support AES when used with WPA2, not WPA1.

WPA1 and WPA2 are more secure than WEP.

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Question about hardware for home wireless networking setup 3 65
How to Create Separate Guest WiFi VLAN on Netgear R8000 19 91
Home internet speed 20 32
Dlink-DIR 816 router 4 21
Need WiFi? Often, there are perfectly good networks that don't have WiFi capability - and there's a need to add it.  - Perhaps you have an Ethernet port into a network but no WiFi nearby. - Perhaps you have a powerline extender and no WiFi at the…
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question