User`s guide
Table Of Contents
- VMG8924-B10A and VMG8924- B30A Series
- User’s Guide
- Technical Reference
- Network Map and Status Screens
- Broadband
- Wireless
- Home Networking
- 7.1 Overview
- 7.2 The LAN Setup Screen
- 7.3 The Static DHCP Screen
- 7.4 The UPnP Screen
- 7.5 Installing UPnP in Windows Example
- 7.6 Using UPnP in Windows XP Example
- 7.7 The Additional Subnet Screen
- 7.8 The STB Vendor ID Screen
- 7.9 The 5th Ethernet Port Screen
- 7.10 The LAN VLAN Screen
- 7.11 The Wake on LAN Screen
- 7.12 Technical Reference
- Routing
- Quality of Service (QoS)
- Network Address Translation (NAT)
- Dynamic DNS Setup
- Interface Group
- USB Service
- Power Management
- Firewall
- MAC Filter
- Parental Control
- Scheduler Rule
- Certificates
- VPN
- Voice
- Log
- Traffic Status
- VoIP Status
- ARP Table
- Routing Table
- IGMP/MLD Status
- xDSL Statistics
- 3G Statistics
- User Account
- Remote Management
- TR-069 Client
- TR-064
- SNMP
- Time Settings
- E-mail Notification
- Logs Setting
- Firmware Upgrade
- Configuration
- Diagnostic
- Troubleshooting
- Customer Support
- Setting up Your Computer’s IP Address
- IP Addresses and Subnetting
- Pop-up Windows, JavaScripts and Java Permissions
- Wireless LANs
- IPv6
- Services
- Legal Information
- Index

Appendix E Wireless LANs
VMG8924-B10A and VMG8924-B30A Series User’s Guide
385
4 The RADIUS server distributes the PMK to the AP. The AP then sets up a key hierarchy and
management system, using the PMK to dynamically generate unique data encryption keys. The
keys are used to encrypt every data packet that is wirelessly communicated between the AP and
the wireless clients.
Figure 243 WPA(2) with RADIUS Application Example
WPA(2)-PSK Application Example
A WPA(2)-PSK application looks as follows.
1 First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key (PSK) must
consist of between 8 and 63 ASCII characters or 64 hexadecimal characters (including spaces and
symbols).
2 The AP checks each wireless client's password and allows it to join the network only if the password
matches.
3 The AP and wireless clients generate a common PMK (Pairwise Master Key). The key itself is not
sent over the network, but is derived from the PSK and the SSID.
4 The AP and wireless clients use the TKIP or AES encryption process, the PMK and information
exchanged in a handshake to create temporal encryption keys. They use these keys to encrypt data
exchanged between them.
Figure 244 WPA(2)-PSK Authentication