EasyManua.ls Logo

ZyXEL Communications VMG3926-B10A - Page 297

ZyXEL Communications VMG3926-B10A
327 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Appendix B Wireless LANs
VMG3926-B10A User’s Guide
297
Figure 172 WPA(2) with RADIUS Application Example
WPA(2)-PSK Application Example
A WPA(2)-PSK application looks as follows.
1 First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key (PSK) must
consist of between 8 and 63 ASCII characters or 64 hexadecimal characters (including spaces and
symbols).
2 The AP checks each wireless client's password and allows it to join the network only if the password
matches.
3 The AP and wireless clients generate a common PMK (Pairwise Master Key). The key itself is not
sent over the network, but is derived from the PSK and the SSID.
4 The AP and wireless clients use the TKIP or AES encryption process, the PMK and information
exchanged in a handshake to create temporal encryption keys. They use these keys to encrypt data
exchanged between them.
Figure 173 WPA(2)-PSK Authentication

Table of Contents

Related product manuals