Figure 21 Security Setting: Wpa-Psk/Wpa2-Psk; Figure 22 Security Setting: Wpa/Wpa2: Encryption; Table 7 Security Setting: Wpa-Psk/Wpa2-Psk - ZyXEL Communications G-210H User Manual

802.11b/g wireless usb adapter
Hide thumbs Also See for G-210H:
Table of Contents

Advertisement

4.4.1.2 WPA-PSK/WPA2-PSK

Figure 21 Security Setting: WPA-PSK/WPA2-PSK

The following table describes the labels in the Security Setting: WPA(2)-PSK screen.

Table 7 Security Setting: WPA-PSK/WPA2-PSK

LABEL
Security
Encryption
Pre-Shared Key
Back
Save
Exit
4.4.1.3 WPA/WPA2
4.4.1.3.1 Encryption

Figure 22 Security Setting: WPA/WPA2: Encryption

G-210H User's Guide
DESCRIPTION
Select WPA-PSK or WPA2-PSK from the drop-down list.
The encryption mechanisms used for WPA/WPA2 and WPA-PSK/WPA2-PSK are
the same. The only difference between the two is that WPA-PSK/WPA2-PSK uses
a simple common password, instead of user-specific credentials.
Select the encryption type (TKIP or AES) for data encryption.
Refer to
Section 3.2.1.3 on page 27
Type a pre-shared key (same as the AP or peer device) of between 8 and 63
case-sensitive ASCII characters (including spaces and symbols) or 64
hexadecimal characters.
Click Back to go to the Site Survey screen to select and connect to another
network.
Click Save to confirm your selections and advance to the Link Info screen.
Click Exit to return to the Site Survey screen without saving.
Chapter 4 ZyXEL Utility - Windows
for more information.
37

Advertisement

Table of Contents
loading

Table of Contents