Introduction To Wpa; Wpa-Psk Application Example - ZyXEL Communications P-660H-T Series User Manual

Adsl2+ 4-port security gateway
Hide thumbs Also See for P-660H-T Series:
Table of Contents

Advertisement

P-660H/HW-T Series User' Guide
Table 14 MAC Filter (continued)
LABEL
MAC Address
Back
Apply
Cancel

5.6 Introduction to WPA

Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. WPA is preferred to
WEP as WPA has user authentication and improved data encryption. See the appendix for
more information on WPA user authentication and WPA encryption.
If you don't have an external RADIUS server, you should use WPA-PSK (WPA -Pre-Shared
Key). WPA-PSK only requires a single (identical) password entered into each WLAN
member. As long as the passwords match, a client will be granted access to a WLAN.
Note: You can't use the Local User Database for authentication when you select
WPA.

5.6.1 WPA-PSK Application Example

A WPA-PSK application looks as follows.
1 First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key
(PSK) must be between 8 and 63 printable characters (including spaces; alphabetic
characters are case-sensitive).
2 The AP checks each client's password and (only) allows it to join the network if the
passwords match.
3 The AP derives and distributes keys to the wireless clients.
4 The AP and wireless clients use the TKIP encryption process to encrypt data exchanged
between them.
77
DESCRIPTION
Enter the MAC addresses in a valid MAC address format, that is, six hexadecimal
character pairs, for example, 12:34:56:78:9a:bc of the wireless stations that are
allowed or denied access to the Prestige in these address fields.
Click Back to go to the main wireless LAN setup screen.
Click Apply to save your changes back to the Prestige.
Click Cancel to begin configuring this screen afresh.
Chapter 5 Wireless LAN

Advertisement

Table of Contents
loading

This manual is also suitable for:

P-660hP-660hw seriesP-660w-t series

Table of Contents