Posted on 2013-11-05
Last Modified: 2013-11-06
I am using a Ubiquiti PicoStation M2. I wish to configure it to be secure. None of the information I have stored is extremely sensitive or valuable, however I want a reasonable level of security. This installation is in the country 1/4 mile from anyone. I do see 4 other wireless networks however. I have six different protocols that are compatible with both the Picostation and my computers. They are:
1. WEP
4. WPA2

What are the advantages and disadvantages of each of these if it is not too difficult to explain? In my situation, which one would you recommend for me? I DO want one that is not flaky or unstable. Experts?
Question by:Need-a-Clue
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
LVL 26

Assisted Solution

Soulja earned 100 total points
ID: 39625363
LVL 28

Accepted Solution

jhyiesla earned 400 total points
ID: 39625411
First configure the device with a complex password so it's not easy for someone to get into it.

Second, as the other expert says, use WPA2.  It's the most secure protocol and is pretty much recognized by any reasonably modern wireless device.   AES is probably "more" secure, but a lot of devices don't recognize it so I usually use TKIP. In your devices this usually translates to WPA2 Personal TKIP.

Third, if possible use MAC restrictions. What this means is that you put into your device the MAC addresses of devices that you want to allow access.  While this is not foolproof, it does help keep intruders out.

Fourth, you can hid the broadcast of the SSID, usually.  What this means is that someone driving by can't see your wireless network. Most devices will work OK with this once you have them programmed, but I've found that's not 100 % true.

Featured Post

Free NetCrunch network monitor licenses!

Only on Experts-Exchange: Sign-up for a free-trial and we'll send you your permanent license!

Here is what you get: 30 Nodes | Unlimited Sensors | No Time Restrictions | Absolutely FREE!

Act now. This offer ends July 14, 2017.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Hyper-convergence systems have taken the IT world by storm and have quickly started to change our point of view of how the data center should and could be architected. In this article, I’ll explain the benefits of employing a hyper-converged system …
pc, laptop  monitor connection configurations
In this video, viewers are given an introduction to using the Windows 10 Snipping Tool, how to quickly locate it when it's needed and also how make it always available with a single click of a mouse button, by pinning it to the Desktop Task Bar. Int…
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question