ZyXEL G-405 User Guide - Page 63

The Log Table Screen, Table 6-8 Security: Set Security Settings: WPA-PSK

Page 63 highlights

ZyAIR G-405 User's Guide Table 6-8 Security: Set Security Settings: WPA-PSK LABEL WPA Pre Shared Key Apply ReAuthenticate View Log DESCRIPTION The encryption mechanisms used for WPA and WPA-PSK are the same. The only difference between the two is that WPA-PSK uses a simple common password, instead of user-specific credentials. Type a pre-shared key from 8 to 63 case-sensitive ASCII characters (including spaces and symbols). Click Apply to save the changes. Click Re-Authenticate to gain access to the wireless/wired network. Click View Log to see the log screen. 6.6 The Log Table Screen The Log Table screen displays the system logs. This log screen is only available when you select 802.1x, WPA or WPA-PSK in the Security Mode field in the Security configuration screen. To view the logs, click View Log in the Security configuration screen. Figure 6-12 Security: Set Security Settings: Log Table The following table describes the labels in this screen. Table 6-9 Security: Set Security Settings: WPA-PSK LABEL Refresh No. Log Message Close DESCRIPTION Click Refresh to update this screen. This field displays the log entry index number. This field displays a brief description of the log. Click Close to close this screen. Wireless LAN Security Setup 6-19

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99

ZyAIR G-405 User’s Guide
Wireless LAN Security Setup
6-19
Table 6-8 Security: Set Security Settings: WPA-PSK
LABEL
DESCRIPTION
WPA Pre
Shared Key
The encryption mechanisms used for
WPA
and
WPA-PSK
are the same. The only
difference between the two is that
WPA-PSK
uses a simple common password, instead of
user-specific credentials.
Type a pre-shared key from 8 to 63 case-sensitive ASCII characters (including spaces and
symbols).
Apply
Click
Apply
to save the changes.
Re-
Authenticate
Click
Re-Authenticate
to gain access to the wireless/wired network.
View Log
Click
View Log
to see the log screen.
6.6
The Log Table Screen
The
Log Table
screen displays the system logs. This log screen is only available when you select
802.1x
,
WPA
or
WPA-PSK
in the
Security Mode
field in the
Security
configuration screen.
To view the logs, click
View Log
in the
Security
configuration screen.
Figure 6-12 Security: Set Security Settings: Log Table
The following table describes the labels in this screen.
Table 6-9 Security: Set Security Settings: WPA-PSK
LABEL
DESCRIPTION
Refresh
Click
Refresh
to update this screen.
No.
This field displays the log entry index number.
Log
Message
This field displays a brief description of the log.
Close
Click
Close
to close this screen.