ZyXEL G-405 User Guide - Page 63
The Log Table Screen, Table 6-8 Security: Set Security Settings: WPA-PSK
View all ZyXEL G-405 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 63 highlights
ZyAIR G-405 User's Guide Table 6-8 Security: Set Security Settings: WPA-PSK LABEL WPA Pre Shared Key Apply ReAuthenticate View Log DESCRIPTION The encryption mechanisms used for WPA and WPA-PSK are the same. The only difference between the two is that WPA-PSK uses a simple common password, instead of user-specific credentials. Type a pre-shared key from 8 to 63 case-sensitive ASCII characters (including spaces and symbols). Click Apply to save the changes. Click Re-Authenticate to gain access to the wireless/wired network. Click View Log to see the log screen. 6.6 The Log Table Screen The Log Table screen displays the system logs. This log screen is only available when you select 802.1x, WPA or WPA-PSK in the Security Mode field in the Security configuration screen. To view the logs, click View Log in the Security configuration screen. Figure 6-12 Security: Set Security Settings: Log Table The following table describes the labels in this screen. Table 6-9 Security: Set Security Settings: WPA-PSK LABEL Refresh No. Log Message Close DESCRIPTION Click Refresh to update this screen. This field displays the log entry index number. This field displays a brief description of the log. Click Close to close this screen. Wireless LAN Security Setup 6-19