The Log Table Screen; Figure 6-12 Security: Set Security Settings: Log Table - ZyXEL Communications ZyAIR G-405 User Manual

802.11g wireless ethernet adapter
Hide thumbs Also See for ZyAIR G-405:
Table of Contents

Advertisement

LABEL
WPA Pre
The encryption mechanisms used for WPA and WPA-PSK are the same. The only
Shared Key
difference between the two is that WPA-PSK uses a simple common password, instead of
user-specific credentials.
Type a pre-shared key from 8 to 63 case-sensitive ASCII characters (including spaces and
symbols).
Click Apply to save the changes.
Apply
Re-
Click Re-Authenticate to gain access to the wireless/wired network.
Authenticate
View Log
Click View Log to see the log screen.
6.6

The Log Table Screen

The Log Table screen displays the system logs. This log screen is only available when you select 802.1x,
WPA or WPA-PSK in the Security Mode field in the Security configuration screen.
To view the logs, click View Log in the Security configuration screen.
The following table describes the labels in this screen.
LABEL
Click Refresh to update this screen.
Refresh
No.
This field displays the log entry index number.
Log
This field displays a brief description of the log.
Message
Close
Click Close to close this screen.
Wireless LAN Security Setup
Table 6-8 Security: Set Security Settings: WPA-PSK

Figure 6-12 Security: Set Security Settings: Log Table

Table 6-9 Security: Set Security Settings: WPA-PSK
DESCRIPTION
DESCRIPTION
ZyAIR G-405 User's Guide
6-19

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents