User's Manual

21
WPA
WPA encrypts all traffic between the access point and the client using either TKIP or AES
encryption. Depending on the authentication protocol selected, each client must authenticate
using their own unique username, password, and security certificate.
WPA-PSK
WPA-PSK is a compromise between WPA and WEP. Like WEP, it uses a pre-shared key that
every user of the network must have in order to send and receive data. Like WPA, it uses either
TKIP or AES.
5. Make the changes you want and click TCP/IP Config.
Select the Use IP Changer checkbox. This allows you to bypass your existing wireless TCP/
IP settings and configure TCP/IP settings for each profile.
Use DHCP
DHCP (Dynamic Host Configuration Protocol) automatically assign IP addresses. Check this
radio button if your router is set to DHCP.
Use static IP below
Check this radio button if you have to enter a static IP address.
IT IS RECOMMEDED THAT YOU USE WPA OR WPA-PSK WHENEVER POSSIBLE.
WPA (WI-FI PROTECTED ACCESS) PROVIDES STRONGER ENCRYPTION THAN
THE EARLIER
WEP (WIRED EQUIVALENT PRIVACY) METHOD.
IMPORTANT