Руководство Пользователя для ZyXEL p-330w
ZyXEL P-330W User’s Guide
Chapter 5 Wireless
60
5.7.4.3 WPA-PSK Application Example
A WPA-PSK application looks as follows.
1 First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key
(PSK) must consist of between 8 and 63 ASCII characters (including spaces and
symbols).
symbols).
2 The AP checks each client’s password and (only) allows it to join the network if it
matches its password.
3 The AP derives and distributes keys to the wireless clients.
4 The AP and wireless clients use the TKIP encryption process to encrypt data exchanged
between them.
Figure 32 WPA - PSK Authentication
5.7.5 Introduction to WPA2
WPA2 is based on the same 802.11i spec as WPA. The primary difference between WPA and
WPA2 is that WPA2 uses AES encryption in places of TKIP. Like WPA, WPA2 can function
either using a pre-shared key or by using a RADIUS server to perform authentication. WPA2
also offers a mixed mode which allows WPA clients to authenticate and use TKIP encryption
while still allowing WPA2 clients to use AES. Configuration of WPA2 is the same as WPA.
WPA2 is that WPA2 uses AES encryption in places of TKIP. Like WPA, WPA2 can function
either using a pre-shared key or by using a RADIUS server to perform authentication. WPA2
also offers a mixed mode which allows WPA clients to authenticate and use TKIP encryption
while still allowing WPA2 clients to use AES. Configuration of WPA2 is the same as WPA.
5.7.6 Configuring WPA-PSK Authentication
In order to configure and enable WPA-PSK encryption; click the SECURITY link under
WIRELESS to display the Wireless Security screen. Select WPA (TKIP) from the
Encryption list. Select PERSONAL under WPA Encryption Mode.
WIRELESS to display the Wireless Security screen. Select WPA (TKIP) from the
Encryption list. Select PERSONAL under WPA Encryption Mode.