Figure 90 Wpa(2) With Radius Application Example; Figure 91 Wpa(2)-Psk Authentication - ZyXEL Communications 802.11b/g Wireless Access Point NWA-1100 User Manual

802.11b/g wireless access point
Hide thumbs Also See for 802.11b/g Wireless Access Point NWA-1100:
Table of Contents

Advertisement

Appendix E Wireless LANs

Figure 90 WPA(2) with RADIUS Application Example

WPA(2)-PSK Application Example
A WPA(2)-PSK application looks as follows.
1 First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key
(PSK) must consist of between 8 and 63 ASCII characters or 64 hexadecimal characters
(including spaces and symbols).
2 The AP checks each wireless client's password and (only) allows it to join the network if
the password matches.
3 The AP and wireless clients use the pre-shared key to generate a common PMK
(Pairwise Master Key).
4 The AP and wireless clients use the TKIP or AES encryption process to encrypt data
exchanged between them.

Figure 91 WPA(2)-PSK Authentication

164
ZyXEL NWA-1100 User's Guide

Advertisement

Table of Contents
loading

Table of Contents