Security: Wpa-Psk, Wpa2-Psk, Wpa2-Psk-Mix; Technical Reference; Figure 41 Security: Wpa-Psk, Wpa2-Psk Or Wpa2-Psk-Mix; Table 24 Security: Wpa-Psk, Wpa2-Psk Or Wpa2-Psk-Mix - ZyXEL Communications 802.11b/g Wireless Access Point NWA-1100 User Manual

802.11b/g wireless access point
Hide thumbs Also See for 802.11b/g Wireless Access Point NWA-1100:
Table of Contents

Advertisement

7.4.6 Security: WPA-PSK, WPA2-PSK, WPA2-PSK-MIX

Use this screen to employ WPA-PSK, WPA2-PSK or WPA2-PSK-MIX as the security mode
of your ZyXEL Device. Select WPA-PSK, WPA2-PSK or WPA2-PSK-MIX in the Security
Mode field to display the following screen.

Figure 41 Security: WPA-PSK, WPA2-PSK or WPA2-PSK-MIX

The following table describes the labels not previously discussed

Table 24 Security: WPA-PSK, WPA2-PSK or WPA2-PSK-MIX

LABEL
Security Mode
Pre-Shared Key
Apply
Reset

7.5 Technical Reference

This section provides technical background information on the topics discussed in this chapter.
The following is a general guideline in choosing the security mode for your ZyXEL Device.
• Use WPA(2)-PSK if you have WPA(2)-aware wireless clients but no RADIUS server.Use
WPA(2) security if you have WPA(2)-aware wireless clients and a RADIUS server. WPA
has user authentication and improved data encryption over WEP.
• Use WPA(2)-PSK if you have WPA(2)-aware wireless clients but no RADIUS server.
• If you don't have WPA(2)-aware wireless clients, then use WEP key encrypting. A higher
bit key offers better security. You can manually enter 64-bit, 128-bit or 152-bit WEP keys.
More information on Wireless Security can be found in
ZyXEL NWA-1100 User's Guide
DESCRIPTION
Choose WPA-PSK, WPA2-PSK or WPA2-PSK-MIX in this field.
The encryption mechanisms used for WPA and WPA-PSK are the same. The only
difference between the two is that WPA-PSK uses a simple common password,
instead of user-specific credentials.
Type a pre-shared key from 8 to 63 case-sensitive ASCII characters (including
spaces and symbols).
Click Apply to save your changes.
Click Reset to begin configuring this screen afresh.
Chapter 7 Wireless Security Screen
Appendix E on page
153.
87

Advertisement

Table of Contents
loading

Table of Contents