Wpa-Psk/Wpa2-Psk; Figure 4-2 Security Settings: Wpa-Psk/Wpa2-Psk; Table 4-3 Security Settings: Wpa-Psk/Wpa2-Psk - ZyXEL Communications ZYAIR G-162 User Manual

802.11g wireless cardbus card
Hide thumbs Also See for ZYAIR G-162:
Table of Contents

Advertisement

4.3.2 WPA-PSK/WPA2-PSK

The following table describes the labels in this screen.
FIELD
Encryption Type
Pass Phrase
Save
Security Settings

Figure 4-2 Security Settings: WPA-PSK/WPA2-PSK

Table 4-3 Security Settings: WPA-PSK/WPA2-PSK

WPA uses TKIP and WPA2 uses AES to improve data encryption.
The encryption mechanisms used for WPA(2) and WPA(2)-PSK are the same. The
only difference between the two is that WPA(2)-PSK uses a simple common
password, instead of user-specific credentials.
Type the passphrase (same as the AP or peer device) from 8 to 63 case-sensitive
ASCII characters (including spaces and symbols).
Click Save to save the changes and display the Link Info screen. Otherwise, click
the close (
) button to discard changes and go back to the previous screen.
ZyXEL G-162 User's Guide
DESCRIPTION
4-5

Advertisement

Table of Contents
loading

Table of Contents