User Manual
Table Of Contents
- NBG-418N v2
- User’s Guide
- Introduction
- The Web Configurator
- Connection Wizard
- Modes
- Tutorials
- 5.1 Overview
- 5.2 How to Connect to the Internet from an AP
- 5.3 Configure Wireless Security Using WPS on both your NBG-418N v2 and Wireless Client
- 5.4 Enable and Configure Wireless Security without WPS on your NBG-418N v2
- 5.5 Using Multiple SSIDs on the NBG-418N v2
- 5.6 Installing UPnP in Windows 7 Example
- 5.7 Using Bandwidth Management on the NBG-418N v2
- Technical Reference
- Wireless LAN
- WAN
- LAN
- DHCP Server
- Network Address Translation
- Dynamic DNS
- Static Route
- Firewall
- Content Filter
- Remote Management
- Universal Plug-and-Play (UPnP)
- Bandwidth MGMT
- System
- Logs
- Tools
- Sys OP Mode
- Language
- Troubleshooting
- Customer Support
- IP Addresses and Subnetting
- Pop-up Windows, JavaScripts and Java Permissions
- Setting Up Your Computer’s IP Address
- Wireless LANs
- Common Services
- Legal Information
- Index
Appendix E Wireless LANs
NBG-418N v2 User’s Guide
215
3 A 256-bit Pairwise Master Key (PMK) is derived from the authentication process by the RADIUS server and
the client.
4 The RADIUS server distributes the PMK to the AP. The AP then sets up a key hierarchy and management
system, using the PMK to dynamically generate unique data encryption keys. The keys are used to
encrypt every data packet that is wirelessly communicated between the AP and the wireless clients.
Fig ure 147 WPA(2) with RADIUS Application Example
WPA(2)- PSK Applic a tion Exa mple
A WPA(2)-PSK application looks as follows.
1 First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key (PSK) must consist
of between 8 and 63 ASCII characters or 64 hexadecimal characters (including spaces and symbols).
2 The AP checks each wireless client's password and allows it to join the network only if the password
matches.
3 The AP and wireless clients generate a common PMK (Pairwise Master Key). The key itself is not sent over
the network, but is derived from the PSK and the SSID.
4 The AP and wireless clients use the TKIP or AES encryption process, the PMK and information exchanged
in a handshake to create temporal encryption keys. They use these keys to encrypt data exchanged
between them.