Reference Manual for the 54 Mbps Wireless ADSL Firewall Router DG834G
Wireless Configuration 4-9
202-10006-01
Choosing WEP Authentication and Security Encryption Methods
Figure 4-5. Security Encryption section
Restricting wireless access prevents intruders from connecting to your network. However, the
wireless data transmissions are still vulnerable to snooping. Using the WEP data encryption
settings described below will prevent a determined intruder from eavesdropping on your wireless
data communications. Also, if you are using the Internet for such activities as purchases or
banking, those Internet sites use another level of highly secure encryption called SSL. You can tell
if a web site is using SSL because the web address begins with HTTPS rather than HTTP.
Authentication Type Selection
The DG834G lets you select the following wireless authentication schemes.
• Automatic
• Open System
• Shared key
Note: The authentication scheme is separate from the data encryption. You can choose
an authentication scheme which requires a shared key but still leave the data
transmissions unencrypted. If you require strong security, use both the Shared Key and
WEP encryption settings.