Appendix B Wireless LANs
AX/DX/EX/PX Series User’s Guide
529
WPA(2)-PSK Application Example
A WPA(2)-PSK application looks as follows.
1 First enter identical passwords into the AP and all WiFi clients. The Pre-Shared Key (PSK) must consist of 
between 8 to 63 alphanumeric (0-9, a-z, A-Z) and special characters, including spaces.
2 The AP checks each WiFi client's password and allows it to join the network only if the password 
matches.
3 The AP and WiFi clients generate a common PMK (Pairwise Master Key). The key itself is not sent over the 
network, but is derived from the PSK and the SSID. 
4 The AP and WiFi clients use the TKIP or AES encryption process, the PMK and information exchanged in a 
handshake to create temporal encryption keys. They use these keys to encrypt data exchanged 
between them.
Figure 295   WPA(2)-PSK Authentication
Security Parameters Summary
Refer to this table to see what other security parameters you should configure for each authentication 
method or key management protocol type. MAC address filters are not dependent on how you 
configure these security features.
Table 199   Wireless Security Relational Matrix
AUTHENTICATION METHOD/ 
KEY MANAGEMENT 
PROTOCOL
ENCRYPTION 
METHOD
ENTER MANUAL 
KEY
IEEE 802.1X
Open None No Disable
Enable without Dynamic WEP Key
Open WEP No           Enable with Dynamic WEP Key
Yes Enable without Dynamic WEP Key
Yes Disable
Shared WEP  No           Enable with Dynamic WEP Key
Yes Enable without Dynamic WEP Key
Yes Disable