LevelOne WBR-6010 User Manual page 29

N_max wireless broadband router
Table of Contents

Advertisement

Setup
PSK
Encryption
WPA2-PSK Wireless Security
Data - WPA2-PSK Screen
Authentication
PSK
Encryption
Enter the PSK (network key). Data is encrypted using a key
derived from the network key. Other Wireless Stations must
use the same network key. The PSK must be from 8 to 63
characters in length.
The WPA-PSK standard allows different encryption methods to
be used. Select the desired option. Wireless Stations must use
the same encryption method.
Figure 12: WPA2-PSK
WPA2-PSK
This is a further development of WPA-PSK, and offers even
greater security.
Enter the PSK (network key). Data is encrypted using a key
derived from the network key. Other Wireless Stations must
use the same network key. The PSK must be from 8 to 63
characters in length.
The WPA2-PSK standard allows different encryption methods
to be used. Select the desired option. Wireless Stations must
use the same encryption method.
29

Advertisement

Table of Contents
loading

Table of Contents