Wpa-Psk - THOMSON SpeedTouch 716 User Manual

Broadband voice iad
Hide thumbs Also See for SpeedTouch 716:
Table of Contents

Advertisement

2.4.4 WPA-PSK

Definition
Configuring WPA-PSK
on the SpeedTouch™
E-DOC-CTC-20041126-0014 v3.0
Contrary to WPA, WPA-Pre Shared Key (WPA-PSK) does not need the presence of
an authentication server on your network.
WPA Personal features 3 basic improvements over WEP.
1
Mutual authentication of access point and client via a 4-way handshake. In this
handshake, both client and access point check whether they share the same
Pre-Shared Key (without sending the PSK "in the clear").
2
Stronger encryption, using the Temporal Key Integrity Protocol (TKIP). In stead
of using a fixed WEP key, TKIP uses in pairs temporary session keys which are
derived from the PSK during the 4-way handshake.
3
Message Integrity Check (MIC), a strong mathematical function in which the
recipient and transmitter each compute and compare the MIC. Non-matching
MICs reveal that a third party has been tampering the data to try and hack the
system.
Proceed as follows:
1
Open the SpeedTouch™ web pages.
For more information, see
Pages" on page
2
Browse to Wireless > Security.
3
In the Wi-Fi Protected Access list, click WPA-PSK.
4
Following fields appear:
Format:
Choose the typing method of encryption key. You have to click either
Hexadecimal digits or ASCII characters and type the keys on the field of
Pre-Share Key.
Pre-Share Key:
Please type the key to be between 8 and 63 characters, or 64 hexadecimal
digits. Only the devices with a matching key that you set here can join
this network.
WPA Group Rekey Interval:
Enter the time for the WPA group rekey interval. The unit is second.
Data Encryption (WPA):
Select the data encryption for the WPA mode. Following encryption
types are available:
TKIP:
Takes the original master key only as a starting point and derives its
encryption keys mathematically from this master key. Then it
regularly changes and rotates the encryption keys so that the same
encryption key will be never used twice.
AES:
Provides security between client workstations operating in ad hoc
mode. It uses a mathematical ciphering algorithm that employs
variable key sizes of 128, 192 or 256 bits.
TKIP+AES:
Combines the features and functions of TKIP and AES.
5
Enter the configuration of your choice.
6
Click Apply.
SpeedTouch™ Local Networking Setup
"5.1 Accessing the SpeedTouch™ Web
44.
Chapter 2
29

Advertisement

Table of Contents
loading

This manual is also suitable for:

Speedtouch 716g

Table of Contents