Appendix B Wireless LANs
VMG/XMG Series User’s Guide
405
WPA(2)-PSK Application Example
A WPA(2)-PSK application looks as follows.
1 First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key (PSK) must consist 
of between 8 and 63 ASCII characters or 64 hexadecimal characters (including spaces and symbols).
2 The AP checks each wireless client's password and allows it to join the network only if the password 
matches.
3 The AP and wireless clients generate a common PMK (Pairwise Master Key). The key itself is not sent over 
the network, but is derived from the PSK and the SSID. 
4 The AP and wireless clients use the TKIP or AES encryption process, the PMK and information exchanged 
in a handshake to create temporal encryption keys. They use these keys to encrypt data exchanged 
between them.
Figure 254   WPA(2)-PSK Authentication
Security Parameters Summary
Refer to this table to see what other security parameters you should configure for each authentication 
method or key management protocol type. MAC address filters are not dependent on how you 
configure these security features.
Table 170   Wireless Security Relational Matrix
AUTHENTICATION METHOD/ 
KEY MANAGEMENT 
PROTOCOL
ENCRYPTION 
METHOD
ENTER MANUAL 
KEY
IEEE 802.1X
Open None No Disable
Enable without Dynamic WEP Key
Open WEP No           Enable with Dynamic WEP Key
Yes Enable without Dynamic WEP Key
Yes Disable
Shared WEP  No           Enable with Dynamic WEP Key
Yes Enable without Dynamic WEP Key
Yes Disable