Figure 186 Wpa(2) With Radius Application Example; Figure 187 Wpa(2)-Psk Authentication - ZyXEL Communications P-660HW-T - V2 User Manual

802.11g wireless adsl 2+ 4-port gateway
Hide thumbs Also See for P-660HW-T - V2:
Table of Contents

Advertisement

P-660HW-T v2 User's Guide

Figure 186 WPA(2) with RADIUS Application Example

WPA(2)-PSK Application Example
A WPA(2)-PSK application looks as follows.
1 First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key
(PSK) must consist of between 8 and 63 ASCII characters or 64 hexadecimal characters
(including spaces and symbols).
2 The AP checks each wireless client's password and (only) allows it to join the network if
the password matches.
3 The AP and wireless clients use the pre-shared key to generate a common PMK (Pairwise
Master Key).
4 The AP and wireless clients use the TKIP or AES encryption process to encrypt data
exchanged between them.

Figure 187 WPA(2)-PSK Authentication

332
Appendix K Wireless LANs

Advertisement

Table of Contents
loading

Table of Contents