Prestige 334W User’s Guide

Step 3. The AP derives and distributes keys to the wireless clients.

Step 4. The AP and wireless clients use the TKIP encryption process to encrypt data exchanged between them.

Figure 8-5 WPA - PSK Authentication

8.6Configuring WPA-PSK Authentication

In order to configure and enable WPA-PSK Authentication; click the WIRELESS link under ADVANCED to display the Wireless screen. Select WPA-PSKfrom the Security list.

8-10

Wireless Security