Chapter 7 Wireless LAN

Click Network Setting > Wireless to display the General screen. Select More Secure as the security level. Then select WPA-PSK or WPA2-PSK from the Security Mode list.

Figure 30 Wireless > General: More Secure: WPA(2)-PSK

The following table describes the wireless LAN security labels in this screen.

Table 19 Wireless > General: More Secure: WPA(2)-PSK

LABEL

DESCRIPTION

Security Level

Select More Secure to enable WPA(2)-PSK data encryption.

 

 

Security Mode

Select WPA-PSKor WPA2-PSKfrom the drop-down list box.

 

 

Pre-Shared Key

The encryption mechanisms used for WPA(2) and WPA(2)-PSK are the same. The only

 

difference between the two is that WPA(2)-PSK uses a simple common password,

 

instead of user-specific credentials.

 

Type a pre-shared key from 8 to 63 case-sensitive keyboard characters.

 

 

more.../hide more

Click more... to show more fields in this section. Click hide more to hide them.

 

 

WPA-PSK Compatible

This field appears when you choose WPA-PSK2as the Security Mode.

 

Select Enable to allow wireless devices using WPA-PSKsecurity mode to connect to

 

your AMG1312-T Series. The AMG1312-T Series supports WPA-PSK and WPA2-PSK

 

simultaneously. Otherwise, select Disable.

 

 

Group Key Update

The Group Key Update Timer is the rate at which the RADIUS server sends a new

Timer

group key out to all clients.

 

 

Encryption

This field displays the encryption type for data encryption.

 

If you choose WPA-PSKas the security mode, the AMG1312-T Series uses TKIP for

 

data encryption.

 

If you choose WPA2-PSKas the security mode and enable WPA-PSK Compatible, the

 

AMG1312-T Series uses either TKIP and AES (TKIPAES MIX) for data encryption.

 

If you choose WPA2-PSKas the security mode but disable WPA-PSK Compatible, the

 

AMG1312-T Series uses AES for data encryption.

 

 

7.2.4 WPA(2) Authentication

The WPA2 security mode is currently the most robust form of encryption for wireless networks. It requires a RADIUS server to authenticate user credentials and is a full implementation the security protocol. Use this security option for maximum protection of your network. However, it is the least backwards compatible with older devices.

92

 

AMG1312-T Series User’s Guide