Wpa(2)-Psk Application Example; Wpa(2) With Radius Application Example; Figure 156 Wpa(2)-Psk Authentication - ZyXEL Communications ZyXEL NBG334SH User Manual

802.11g super g high power wireless router
Hide thumbs Also See for ZyXEL NBG334SH:
Table of Contents

Advertisement

Appendix F Wireless LANs

21.5.2 WPA(2)-PSK Application Example

A WPA(2)-PSK application looks as follows.
1 First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key
(PSK) must consist of between 8 and 63 ASCII characters (including spaces and
symbols).
2 The AP checks each wireless client's password and (only) allows it to join the network if
the password matches.
3 The AP derives and distributes keys to the wireless clients.
4 The AP and wireless clients use the TKIP or AES encryption process to encrypt data
exchanged between them.

Figure 156 WPA(2)-PSK Authentication

21.5.3 WPA(2) with RADIUS Application Example

You need the IP address of the RADIUS server, its port number (default is 1812), and the
RADIUS shared secret. A WPA(2) application example with an external RADIUS server
looks as follows. "A" is the RADIUS server. "DS" is the distribution system.
1 The AP passes the wireless client's authentication request to the RADIUS server.
2 The RADIUS server then checks the user's identification against its database and grants
or denies network access accordingly.
3 The RADIUS server distributes a Pairwise Master Key (PMK) key to the AP that then
sets up a key hierarchy and management system, using the pair-wise key to dynamically
generate unique data encryption keys to encrypt every data packet that is wirelessly
communicated between the AP and the wireless clients.
248
ZyXEL NBG-334SH User's Guide

Advertisement

Table of Contents
loading

Table of Contents