802.1X; Figure 15 Security Settings: Wpa-Psk/Wpa2-Psk; Figure 16 Security Settings: 802.1X; Table 8 Security Settings: Wpa-Psk/Wpa2-Psk - ZyXEL Communications G-270S User Manual

802.11g wireless usb 2.0 adapter
Hide thumbs Also See for G-270S:
Table of Contents

Advertisement

Figure 15 Security Settings: WPA-PSK/WPA2-PSK

The following table describes the labels in this screen.

Table 8 Security Settings: WPA-PSK/WPA2-PSK

LABEL
Security Setting
Encryption Type
Pass Phrase
Back
Next
Exit

3.2.2.4 802.1x

Figure 16 Security Settings: 802.1x

Chapter 3 ZyXEL Utility Configuration
DESCRIPTION
The encryption mechanisms used for WPA/WPA2 and WPA-PSK/WPA2-PSK are
the same. The only difference between the two is that WPA-PSK/WPA2-PSK uses
a simple common password, instead of user-specific credentials.
The encryption types for WPA-PSK and WPA2-PSK are TKIP and AES
respectively. Refer to
Section 2.2.3 on page 27
Type a passphrase from 8 to 63 case-sensitive ASCII characters (including spaces
and symbols).
Click Back to go to the Site Survey screen to select and connect to other network.
Click Next to confirm your selections and advance to the Confirm Save screen.
Refer to
Section 3.2.3 on page
Click Exit to return to the Site Survey screen without saving.
ZyXEL G-270S User's Guide
for more information.
42.
41

Advertisement

Table of Contents
loading

Table of Contents