TRENDnet TEW-603PI manual WPA/WPA2

Page 15

WPA/WPA2

WPA encrypts all traffic between the access point and the client using either TKIP or AES encryption. Depending on the authentication protocol selected, each client must authenticate using their own unique username, password, and security certificate.

WPA-PSK/WPA2-PSK

WPA-PSK is a compromise between WPA and WEP. Like WEP, it uses a pre-shared key that every user of the network must have in order to send and receive data. Like WPA, it uses either TKIP or AES.

IMPORTANT

IT IS RECOMMEDED THAT YOU USE WPA OR WPA-PSKWHENEVER POSSIBLE. WPA (WI-FI PROTECTED ACCESS) PROVIDES STRONGER ENCRYPTION THAN THE EARLIER WEP (WIRED EQUIVALENT PRIVACY) METHOD.

5. Make the changes you want and click TCP/IP Config.

Select the Use IP Changer checkbox. This allows you to bypass your existing wireless TCP/ IP settings and configure TCP/IP settings for each profile.

Use DHCP

DHCP (Dynamic Host Configuration Protocol) automatically assign IP addresses. Check this radio button if your router is set to DHCP.

Use static IP below

Check this radio button if you have to enter a static IP address.

15

Image 15
Contents Page Federal Communication Commission Interference Statement CE Mark Warning Table of Contents Getting Started with the TEW-603PI LED Definition About Your Wireless Mimo PCI AdapterPackage Content System RequirementProduct Outline Overview of the Wireless Client Utility Click Profile Working with ProfilesPage Click Next. The Wlan Security Configuration screen appears Page Modifying Profiles Page WPA/WPA2 Checking for Available Access Points Disabling the Wireless Client Utility Page Network Screen Exploring the Wireless Client Utility ScreensSecurity Shows the current network IP address Profile Screen SiteSurvey Screen Assigned to a wireless Wi-Fi network Options Screen Version Screen Configuring Security Configuring Wireless SecurityProperties window, click Wlan Security Select the encryption to match your access point Configuring WPA & WPA2 Configuring WPA-PSK & WPA2-PSK Type in a unique User ID and Password under User Information Check this box if your network requires user certification Configuring 802.1X EAP-TLS Glossary Ssid Appendix MaintenanceClick Next in the Choose Destination Location screen Problem Corrective Action TroubleshootingProblems Communicating With Other Computers Page Limited Warranty