ZyXEL P-330W User Guide - Page 60

Introduction to WPA2, Configuring WPA-PSK Authentication

Page 60 highlights

ZyXEL P-330W User's Guide 5.7.4.3 WPA-PSK Application Example A WPA-PSK application looks as follows. 1 First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key (PSK) must consist of between 8 and 63 ASCII characters (including spaces and symbols). 2 The AP checks each client's password and (only) allows it to join the network if it matches its password. 3 The AP derives and distributes keys to the wireless clients. 4 The AP and wireless clients use the TKIP encryption process to encrypt data exchanged between them. Figure 32 WPA - PSK Authentication 5.7.5 Introduction to WPA2 WPA2 is based on the same 802.11i spec as WPA. The primary difference between WPA and WPA2 is that WPA2 uses AES encryption in places of TKIP. Like WPA, WPA2 can function either using a pre-shared key or by using a RADIUS server to perform authentication. WPA2 also offers a mixed mode which allows WPA clients to authenticate and use TKIP encryption while still allowing WPA2 clients to use AES. Configuration of WPA2 is the same as WPA. 5.7.6 Configuring WPA-PSK Authentication In order to configure and enable WPA-PSK encryption; click the SECURITY link under WIRELESS to display the Wireless Security screen. Select WPA (TKIP) from the Encryption list. Select PERSONAL under WPA Encryption Mode. Chapter 5 Wireless 60

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141

ZyXEL P-330W User’s Guide
Chapter 5 Wireless
60
5.7.4.3
WPA-PSK Application Example
A WPA-PSK application looks as follows.
1
First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key
(PSK) must consist of between 8 and 63 ASCII characters (including spaces and
symbols).
2
The AP checks each client’s password and (only) allows it to join the network if it
matches its password.
3
The AP derives and distributes keys to the wireless clients.
4
The AP and wireless clients use the TKIP encryption process to encrypt data exchanged
between them.
Figure 32
WPA - PSK Authentication
5.7.5
Introduction to WPA2
WPA2 is based on the same 802.11i spec as WPA.
The primary difference between WPA and
WPA2 is that WPA2 uses AES encryption in places of TKIP.
Like WPA, WPA2 can function
either using a pre-shared key or by using a RADIUS server to perform authentication.
WPA2
also offers a mixed mode which allows WPA clients to authenticate and use TKIP encryption
while still allowing WPA2 clients to use AES.
Configuration of WPA2 is the same as WPA.
5.7.6
Configuring WPA-PSK Authentication
In order to configure and enable WPA-PSK encryption; click the
SECURITY
link under
WIRELESS
to display the
Wireless Security
screen. Select
WPA (TKIP)
from the
Encryption
list.
Select
PERSONAL
under
WPA Encryption Mode
.