Figure 5-20: Wireless Security - Psk Personal; Figure 5-21: Wireless Security - Psk2 Personal - Linksys WPC300N User Manual

2.4ghz wireless-n notebook adapter
Hide thumbs Also See for WPC300N:
Table of Contents

Advertisement

Wireless-N Notebook Adapter
PSK
PSK two encryption methods, TKIP and AES, with dynamic encryption keys. Select TKIP or
AES for encryption. Then enter a Pre-shared Key that is 8-63 characters in length.
Encryption - Select the type of algorithm you want to use, TKIP or AES, from the Encryption drop-down menu.
Pre-shared Key - Enter a Pre-shared Key of 8-63 characters in the Pre-shared Key field.
Click the Next button to continue or the Back button to return to the previous screen
PSK2
Enter a Pre-shared Key that is 8-63 characters in length.
Pre-shared Key - Enter a Pre-shared Key of 8-63 characters in the Pre-shared Key field.
Click the Next button to continue or the Back button to return to the previous screen.
Chapter 5: Using the Wireless Network Monitor
Create a New Profile
Figure 5-20: Wireless Security - PSK
wpa (wi-fi protected access: a wireless security protocol
using TKIP (Temporal Key Integrity Protocol) encryption,
which can be used in conjunction with a RADIUS server.
Figure 5-21: Wireless Security - PSK2
27

Advertisement

Table of Contents
loading

Table of Contents