authentication protocol (EAP). WEP regulates access to a wireless network based on
a computer’s hardware-specific MAC address, which is relatively simple to be sniffed
out and stolen. EAP is built on a more secure public-key encryption system to ensure
that only authorized network users can access the network.
WPA-PSK/WPA2-PSK uses a passphrase or key to authenticate your wireless
connection. The key is an alpha-numeric password between 8 and 63 characters
long. The password can include symbols (!?*&_) and spaces. This key must be the
exact same key entered on your wireless router or access point.
WPA/WPA2 incorporates user authentication through the Extensible Authentication
Protocol (EAP). EAP is built on a more secure public key encryption system to
ensure that only authorized network users can access the network.
4. What is NAT?
NAT stands for Network Address Translator. It is proposed and described in RFC-
1631 and is used for solving the IP Address depletion problem. Each NAT box has a
table consisting of pairs of local IP Addresses and globally unique addresses, by
which the box can “translate” the local IP Addresses to global address and vice
verse. Simply put, it is a method of connecting multiple computers to the Internet (or
any other IP network) using one IP Address. The broadband routers (ie: Wireless
Router) support NAT. With proper configuration, multiple users can access the
Internet using a single account via the NAT device.
53