ZyXEL VMG1312-B10A User Guide - Page 303
WPA2-PSK Application Example
View all ZyXEL VMG1312-B10A manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 303 highlights
Appendix B Wireless LANs Figure 173 WPA(2) with RADIUS Application Example WPA(2)-PSK Application Example A WPA(2)-PSK application looks as follows. 1 First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key (PSK) must consist of between 8 and 63 ASCII characters or 64 hexadecimal characters (including spaces and symbols). 2 The AP checks each wireless client's password and allows it to join the network only if the password matches. 3 The AP and wireless clients generate a common PMK (Pairwise Master Key). The key itself is not sent over the network, but is derived from the PSK and the SSID. 4 The AP and wireless clients use the TKIP or AES encryption process, the PMK and information exchanged in a handshake to create temporal encryption keys. They use these keys to encrypt data exchanged between them. Figure 174 WPA(2)-PSK Authentication VMG1312-B Series User's Guide 303