
Prestige 334W User’s Guide
Step 3. The AP derives and distributes keys to the wireless clients.
Step 4. The AP and wireless clients use the TKIP encryption process to encrypt data exchanged between them.
Figure8.6Configuring WPA-PSK Authentication
In order to configure and enable
Wireless Security |