Wireless Adapter RNX-N100 User Manual
11
(Wired Equivalent Privacy). The technology is designed to work with existing Wi-Fi
products that have been enabled with WEP. WPA provides improved data encryption
through the Temporal Integrity Protocol (TKIP), which scrambles the keys using a hashing
algorithm and by adding an integrity-checking feature which makes sure that keys haven’t
been tampered with. EAP (Extensible Authentication Protocol) is an extension to the PPP
protocol that enables a variety of authentication protocols to be used. It passes through the
exchange of authentication messages, allowing the authentication software stored in a
server to interact with its counterpart in the client.
• Authentication Type: Select WPA or WPA2 from the drop-down list.
• Encryption: Select TKIP or AES from the drop-down list.
• Click on the Apply button to save the changes.
• Show Password check box. If you want to make sure the accuracy of password you
type, click the Show Password box to check it.
2.4.3 WPA-PSK Authentication & TKIP, AES Encryption
WPA – PSK (Pre-shared Key) is used in a Pre Shared Key mode that does not require an
authentication server. Access to the Internet and the rest of the wireless network services
is allowed only if the pre-shared key of the computer matches that of the Access Point.