ZyXEL Communications wireless active fiber router User Manual
Chapter 4 Wireless LAN
FSG1100HN User’s Guide
39
4.6.2 WPA
Wi-Fi Protected Access (WPA) is an encryption security option designed to improve
upon the features of WEP. It employs Temporal Key Integrity Protocol (TKIP) to
scramble the keys using a hash algorithm and, by adding an integrity-checking
feature, ensures that the keys have not been tampered with. WPA-PSK/WPA2-PSK
uses a passphrase or key to authenticate wireless connections. The key is an
alphanumeric password between 8 and 63 characters long. The password can also
be symbols (!?*&_) and spaces. In addition, WPA/WPA2 includes Extensible
Authentication Protocol (EAP) to ensure only authorized network users can access
the network.
upon the features of WEP. It employs Temporal Key Integrity Protocol (TKIP) to
scramble the keys using a hash algorithm and, by adding an integrity-checking
feature, ensures that the keys have not been tampered with. WPA-PSK/WPA2-PSK
uses a passphrase or key to authenticate wireless connections. The key is an
alphanumeric password between 8 and 63 characters long. The password can also
be symbols (!?*&_) and spaces. In addition, WPA/WPA2 includes Extensible
Authentication Protocol (EAP) to ensure only authorized network users can access
the network.
Click Wireless > Security > WPA to open the Wireless Security WPA screens.
Wireless > Security > WPA
Wireless Security Setup window for WPA (Personal (Pre-Shared Key))
Wireless Security Setup window for WPA (Enterprise (RADIUS))
The following table describes the wireless security for WPA labels in these screens.
Wireless > Security > WPA