ZyXEL P-660HW-D1 Guia Do Utilizador

Página de 460
Prestige 660H/HW Series User’s Guide
89 
Chapter 7 Wireless LAN (Prestige 660HW)
7.5  Introduction to WPA
Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. WPA is preferred to 
WEP as WPA has user authentication and improved data encryption. See the appendix for 
more information on WPA user authentication and WPA encryption.
If you don’t have an external RADIUS server, you should use WPA-PSK (WPA -Pre-Shared 
Key). WPA-PSK only requires a single (identical) password entered into each WLAN 
member. As long as the passwords match, a client will be granted access to a WLAN. 
Note: You can’t use the Local User Database for authentication when you select 
WPA.
7.5.1  WPA-PSK Application Example
A WPA-PSK application looks as follows.
First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key 
(PSK) must be between 8 and 63 printable characters (including spaces; alphabetic 
characters are case-sensitive).
The AP checks each client’s password and (only) allows it to join the network if the 
passwords match.
The AP derives and distributes keys to the wireless clients.
The AP and wireless clients use the TKIP encryption process to encrypt data exchanged 
between them.
Back 
Click Back to go to the main wireless LAN setup screen.
Apply
Click Apply to save your changes back to the Prestige. 
Cancel
Click Cancel to begin configuring this screen afresh.
Table 17   MAC Address Filter (continued)
LABEL
DESCRIPTION