139
Select WEP only when the AP and/or wireless clients do not support WPA or WPA2. WEP is less secure than WPA or
WPA2.
34.1.2 WPA(2)-PSK Application Example
A WPA(2)-PSK application looks as follows.
1
First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key (PSK) must consist of
between 8 and 63 ASCII characters (including spaces and symbols).
2
The AP checks each wireless client's password and (only) allows it to join the network if the password
matches.
3
The AP derives and distributes keys to the wireless clients.
4
The AP and wireless clients use the TKIP or AES encryption process to encrypt data exchanged between
them.
Figure 174
WPA(2)-PSK Authentication
34.1.3 WPA(2) with RADIUS Application Example
You need the IP address of the RADIUS server, its port number (default is 1812), and the RADIUS shared secret. A
WPA(2) application example with an external RADIUS server looks as follows. "A" is the RADIUS server. "DS" is the
distribution system.
1
The AP passes the wireless client's authentication request to the RADIUS server.
2
The RADIUS server then checks the user's identification against its database and grants or denies network
access accordingly.
Summary of Contents for VFG6005
Page 23: ...14 22 Enable DHCP or Static IP ...
Page 30: ...21 ...
Page 44: ...35 6 2 ADVANCED SETUP 3 Click on Wireless Advanced tab You will see the following screen ...
Page 63: ...54 7 8 2 Add VPN IPsec Rule 1 Click on Add tab You will see the following screen ...
Page 85: ...76 10 4 LOG 1 Click on Admin Log tab You will see the following screen ...
Page 104: ...95 ...
Page 137: ...128 Interrupt 10 Base address 0x1000 root localhost ...