TRENDnet TEW-MP1U User's Guide - Page 19

Wireless Security - WPA2-PSK

Page 19 highlights

Wireless Security - WPA2-PSK If "WPA2-PSK" is selected, the screen will look like the following example. Security System Passphrase Encryption Figure 15: WPA2-PSK Screen WPA2-PSK This is a further development of WPA-PSK, and offers even greater security. Enter the Keyword key value. Data is encrypted using a key derived from the PSK. Other Wireless Stations must use the same PSK. The PSK must be from 8 to 63 characters in length. Select the desired option. Other Wireless Stations must use the same method. Page 17

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22

Page 17
Wireless Security - WPA2-PSK
If "WPA2-PSK" is selected, the screen will look like the following example.
Figure 15: WPA2-PSK Screen
Security
System
WPA2-PSK
This is a further development of WPA-PSK, and offers even
greater security.
Passphrase
Enter the Keyword key value. Data is encrypted using a key
derived from the PSK. Other Wireless Stations must use the
same PSK. The PSK must be from 8 to 63 characters in length.
Encryption
Select the desired option. Other Wireless Stations must use the
same method.