
Prestige 334W User’s Guide
8-10 Wireless Security
Step 3. The AP derives and distributes keys to the wireless clients.
Step 4. The AP and wireless clients use the TKIP encryption process to encrypt data exchanged between
them.
Figure 8-5
WPA - PSK Authentication
8.6 Configuring WPA-PSK Authentication
In order to configure and enable WPA-PSK Authentication; click the WIRELESS link under ADVANCED
to display the Wireless screen. Select WPA-PSK from the Security list.
Kommentare zu diesen Handbüchern