Security example – Motorola WU830G User Manual

Page 16

Advertising
background image

SECTION 2

INSTALLATION

2-4

WU830G

Security Example

If you want to use a more secure protocol, the wireless network to
which you are connecting must also support that protocol. For
example, let’s say you decide to enable WPA-PSK on your WU830G.
However, the slightly older wireless network you want to connect to
only supports WEP, which means that you cannot use WPA (and
should use WEP) because the security protocols must match
between the WU830G and the access point.

For additional information about the options supported by the
WU830G, refer to Section 3, Configuration.

Advertising