User Manual

Setup
25
WPA2-PSK Wireless Security
Figure 14: WPA2-PSK
Data - WPA2-PSK Screen
Authentication
This is a further development of WPA-PSK, and offers even greater
security.
PSK
Enter the PSK (network key). Data is encrypted using a key derived
from the network key. Other Wireless Stations must use the same
network key. The PSK must be from 8 to 63 characters in length.
Encryption
The WPA2-PSK standard allows different encryption methods to be
used. Select the desired option. Wireless Stations must use the same
encryption method.
Mixed WPA-PSK/WAP2-PSK Wireless Security
Figure 15: Mixed WPA-PSK/WAP2-PSK
Data - Mixed WPA-PSK/WAP2-PSK Screen
Authentication
This method, sometimes called "Mixed Mode", allows clients to use
EITHER WPA-PSK OR WPA2-PSK.
PSK
Enter the PSK (network key). Data is encrypted using a key derived
from the network key. Other Wireless Stations must use the same
network key. The PSK must be from 8 to 63 characters in length.
PDF created with pdfFactory trial version www.pdffactory.com