ZyXEL p-330w Guía Del Usuario

Descargar
Página de 141
ZyXEL P-330W User’s Guide
Chapter 5 Wireless
60
5.7.4.3  WPA-PSK Application Example
A WPA-PSK application looks as follows.
First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key 
(PSK) must consist of between 8 and 63 ASCII characters (including spaces and 
symbols).
The AP checks each client’s password and (only) allows it to join the network if it 
matches its password.
The AP derives and distributes keys to the wireless clients.
The AP and wireless clients use the TKIP encryption process to encrypt data exchanged 
between them.
Figure 32   WPA - PSK Authentication
5.7.5  Introduction to WPA2
WPA2 is based on the same 802.11i spec as WPA.  The primary difference between WPA and 
WPA2 is that WPA2 uses AES encryption in places of TKIP.  Like WPA, WPA2 can function 
either using a pre-shared key or by using a RADIUS server to perform authentication.  WPA2 
also offers a mixed mode which allows WPA clients to authenticate and use TKIP encryption 
while still allowing WPA2 clients to use AES.  Configuration of WPA2 is the same as WPA. 
5.7.6  Configuring WPA-PSK Authentication 
In order to configure and enable WPA-PSK encryption; click the SECURITY link under 
WIRELESS 
to display the Wireless Security screen. Select WPA (TKIP) from the 
Encryption list.  Select PERSONAL under WPA Encryption Mode.