Wireless Firewall Router User's Guide

P-335 Series User’s Guide
Chapter 5 Wireless LAN (P-335WT) 88
5.4.4 Introduction to WPA and WPA2
Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. WPA is preferred to
WEP as WPA has user authentication and improved data encryption. See the appendix for
more information on WPA user authentication and WPA encryption.
If both an AP and the wireless clients support WPA2 and you have an external RADIUS
server, use WPA2 for stronger data encryption. If you don't have an external RADIUS server,
you should use WPA2 -PSK (WPA2 -Pre-Shared Key) that only requires a single (identical)
password entered into each access point, wireless gateway and wireless client. As long as the
passwords match, a wireless client will be granted access to a WLAN.
Note: You can’t use the Local User Database for authentication when you select
WPA.
5.4.5 WPA(2)-PSK Application Example
A WPA(2)-PSK application looks as follows.
1 First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key
(PSK) must consist of between 8 and 63 ASCII characters (including spaces and
symbols).
2 The AP checks each wireless client's password and (only) allows it to join the network if
the password matches.
3 The AP derives and distributes keys to the wireless clients.
4 The AP and wireless clients use the TKIP or AES encryption process to encrypt data
exchanged between them.
Figure 40 WPA(2)-PSK Authentication
5.4.6 WPA-PSK Authentication Screen
In order to configure and enable WPA-PSK Authentication; click the Wireless LAN link
under Network to display the Wireless screen. Select WPA-PSK from the Security list.