Introduction To Wpa2; Configuring Wpa-Psk Authentication; Figure 36 Wpa - Psk Authentication - ZyXEL Communications P-330W - V1.90 User Manual

802.11g secure wireless internet sharing router
Table of Contents

Advertisement

Chapter 6 Wireless
6.7.4.3 WPA-PSK Application Example
A WPA-PSK application looks as follows.
1 First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key
(PSK) must consist of between 8 and 63 ASCII characters (including spaces and
symbols).
2 The AP checks each client's password and (only) allows it to join the network if it
matches its password.
3 The AP derives and distributes keys to the wireless clients.
4 The AP and wireless clients use the TKIP encryption process to encrypt data exchanged
between them.

Figure 36 WPA - PSK Authentication

6.7.5 Introduction to WPA2

WPA2 is based on the same 802.11i spec as WPA. The primary difference between WPA and
WPA2 is that WPA2 uses AES encryption in places of TKIP. Like WPA, WPA2 can function
either using a pre-shared key or by using a RADIUS server to perform authentication. WPA2
also offers a mixed mode which allows WPA clients to authenticate and use TKIP encryption
while still allowing WPA2 clients to use AES. Configuration of WPA2 is the same as WPA.

6.7.6 Configuring WPA-PSK Authentication

In order to configure and enable WPA-PSK encryption; click the SECURITY link under
WIRELESS to display the Wireless Security screen. Select WPA (TKIP) from the
Encryption list. Select PERSONAL under WPA Encryption Mode.
70
P-330W User's Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

P-330w v2P-330w

Table of Contents