Wireless Security - WPA/WPA2-PSK
If "WPA1/2-PSK" is selected, the screen will look like the following example.
Data - WPA/WPA2-PSK screen
Authentication
Passphrase (PSK)
Key Lifetime
Encryption
Figure 9: WPA/WPA2-PSK Screen
Select the desired option:
WPA-PSK: Like WEP, data is encrypted before transmis-
sion. WPA is more secure than WEP, and should be
used if possible.
WPA2-PSK: This is a further development of WPA-PSK,
and offers even greater security.
WPAM-PSK(Mixed): This method, sometimes called
"Mixed Mode", allows clients to use EITHER WPA-PSK
OR WPA2-PSK.
Enter the Network key value. Data is encrypted using a key
derived from the network key. Other Wireless Stations must
use the same network key. The PSK must be from 8 to 63
characters in length.
This determines how often the encryption key is changed.
Enter the desired value.
Select the desired option. Wireless Stations must use the
same method.
25
Setup