3Com WBR-6000 WPA-PSK Wireless Security, Data - WPA-PSK Screen, Wpa-Psk, Authentication

Models: WBR-6000

1 160
Download 160 pages 47.93 Kb
Page 38
Image 38
WPA-PSK Wireless Security

WPA-PSK Wireless Security

 

Figure 9: WPA-PSK

Data - WPA-PSK Screen

Authentication

WPA-PSK

 

Like WEP, data is encrypted before transmission.

 

WPA is more secure than WEP, and should be

 

used if possible. WPA-PSK is the version of WPA,

 

which does NOT require a Radius Server on your

 

LAN.

 

 

Passphrase

Enter the PSK. Data is encrypted using a key

(PSK)

derived from the network key. Other Wireless

 

Stations must use the same network key. The

 

PSK must be from 8 to 63 characters in length.

Key Lifetime

This determines how often the encryption key is

 

changed. You can change the default value if

 

desired.

Encryption

The WPA-PSK standard allows different

 

encryption methods to be used. Select the desired

 

option. Wireless Stations must use the same

 

encryption method.

 

 

 

32

Page 38
Image 38
3Com WBR-6000 WPA-PSK Wireless Security, Data - WPA-PSK Screen, Wpa-Psk, Authentication, Key Lifetime, Encryption