WPA2-PSK Wireless Security
| Figure 10: |
Data - | |
|
|
Authentication |
|
| This is a further development of |
| offers even greater security, using the AES |
| (Advanced Encryption Standard) method of |
| encryption. |
|
|
Passphrase | Enter the PSK. Data is encrypted using a key |
(PSK) | derived from the network key. Other Wireless |
| Stations must use the same network key. The |
| PSK must be from 8 to 63 characters in length. |
Key Lifetime | This determines how often the encryption key is |
| changed. You can change the default value if |
| desired. |
Encryption | The |
| encryption methods to be used. Select the desired |
| option. Wireless Stations must use the same |
| encryption method. |
|
|
| 33 |