WPA-PSK Wireless Security
| Figure 9: |
Data - | |
Authentication |
|
| Like WEP, data is encrypted before transmission. |
| WPA is more secure than WEP, and should be |
| used if possible. |
| which does NOT require a Radius Server on your |
| LAN. |
|
|
Passphrase | Enter the PSK. Data is encrypted using a key |
(PSK) | derived from the network key. Other Wireless |
| Stations must use the same network key. The |
| PSK must be from 8 to 63 characters in length. |
Key Lifetime | This determines how often the encryption key is |
| changed. You can change the default value if |
| desired. |
Encryption | The |
| encryption methods to be used. Select the desired |
| option. Wireless Stations must use the same |
| encryption method. |
|
|
| 32 |