SmartBridges sB3021 User Manual

Page 70

Advertising
background image

Page 70 of 113

i n t e l l i g e n t w i r e l e s s p l a t f o r m

airHaul

2

Nexus PRO™ User Guide

Table 2-6 WPA-PSK

Page Items

Descriptions

WPA-PSK

WPA-PSK is an extra-strong encryption where the encryption keys are
automatically changed (called re-keying) and authenticated between
devices after a specified period of time, or after a specified number of
packets has been transmitted.

WPA-PSK is far superior to WEP and provides stronger protection for
the home/SOHO user for two reasons. The process used to generate the
encryption key is very rigorous and the re-keying (or key changing) is
done very quickly. This stops even the most determined hacker from
gathering enough data to break the encryption.

WPA-Shared Key

The key that is used by the clients to get authenticated with the Root
Bridge.

Re-key Time

The time period during which the keys will be re-negotiated.

MAC Address

MAC address of the client that can get authenticated



WPA2-PSK


Based on the 802.11i standard, WPA2 was released in 2004 and uses a stronger method of
encryption. Like WPA, WPA2 offers two versions – Personal and Enterprise. Personal mode requires
only an access point and uses a pre-shared key for authentication while Enterprise mode requires a
RADIUS authentication server and uses EAP.

Note: Currently WPA2-PSK is using the TKIP as the encryption type.

Follow the steps below to configure the WPA2-PSK:


1. Click

on

RADIO A: Security (or RADIO B: Security).


2. Select

the

WPA2-PSK from the dropdown menu of the Security Mode.


3. Dial the MAC that can get authenticated.

4. Enter the WPA Shared Key (between 8 to 64 characters) in the dialog box provided.

5. Select the encryption type between TKIP and AES.

6. Enter the Re-key time, by which the authentication is going to be checked repeatedly.

7. Click

on

Apply changes to save the configuration details.


Advertising