Appendix B Wireless LANs
Nebula Mobile Router User’s Guide
332
WPA(2)-PSK Application Example
A WPA(2)-PSK application looks as follows.
1
First enter identical passwords into the AP and all WiFi clients. The Pre-Shared Key (PSK) must consist of
between 8 and 63 ASCII characters or 64 hexadecimal characters (including spaces and symbols).
2
The AP checks each WiFi client's password and allows it to join the network only if the password
matches.
3
The AP and WiFi clients generate a common PMK (Pairwise Master Key). The key itself is not sent over the
network, but is derived from the PSK and the SSID.
4
The AP and WiFi clients use the TKIP or AES encryption process, the PMK and information exchanged in a
handshake to create temporal encryption keys. They use these keys to encrypt data exchanged
between them.
Figure 211
WPA(2)-PSK Authentication
Security Parameters Summary
Refer to this table to see what other security parameters you should configure for each authentication
method or key management protocol type. MAC address filters are not dependent on how you
configure these security features.
Table 139 Wireless Security Relational Matrix
AUTHENTICATION METHOD/
KEY MANAGEMENT
PROTOCOL
ENCRYPTION
METHOD
ENTER MANUAL
KEY
IEEE 802.1X
Open
None
No
Disable
Enable without Dynamic WEP Key
Open
WEP
No
Enable with Dynamic WEP Key
Yes
Enable without Dynamic WEP Key
Yes
Disable
Shared
WEP
No
Enable with Dynamic WEP Key
Yes
Enable without Dynamic WEP Key
Yes
Disable
Summary of Contents for LTE3301-PLUS
Page 16: ...16 PART I User s Guide...
Page 43: ...Chapter 3 Web Configurator Nebula Mobile Router User s Guide 43 Figure 31 Connection Status...
Page 50: ...Chapter 3 Web Configurator Nebula Mobile Router User s Guide 50 Figure 36 Check Icons...
Page 89: ...Nebula Mobile Router User s Guide 89 PART II Technical Reference...
Page 361: ...Index Nebula Mobile Router User s Guide 361 Zyxel Nebula Control Center 18...