Wpa-Psk Application Example; Wpa With Radius Application Example; Figure 34 Wpa - Psk Authentication - ZyXEL Communications ZyAIR G-3000 User Manual

802.11g business access point/bridge/repeater
Hide thumbs Also See for ZyAIR G-3000:
Table of Contents

Advertisement

The encryption mechanisms used for WPA and WPA-PSK are the same. The only difference
between the two is that WPA-PSK uses a simple common password, instead of user-specific
credentials. The common-password approach makes WPA-PSK susceptible to brute-force
password-guessing attacks but it's still an improvement over WEP as it employs an easier-to-
use, consistent, single, alphanumeric password.

6.11 WPA-PSK Application Example

A WPA-PSK application looks as follows.
1 First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key
(PSK) must consist of between 8 and 63 ASCII characters (including spaces and
symbols).
2 The AP checks each client's password and (only) allows it to join the network if it
matches its password.
3 The AP derives and distributes keys to the wireless clients.
4 The AP and wireless clients use the TKIP encryption process to encrypt data exchanged
between them.

Figure 34 WPA - PSK Authentication

6.12 WPA with RADIUS Application Example

You need the IP address of the RADIUS server, its port number (default is 1812), and the
RADIUS shared secret. A WPA application example with an external RADIUS server looks
as follows. "A" is the RADIUS server. "DS" is the distribution system.
Chapter 6 Wireless Security
ZyAIR G-3000 User's Guide
84

Advertisement

Table of Contents
loading

Table of Contents