Equinox Systems ZyAIR G-200 User Manual

Page 33

Advertising
background image

ZyAIR G-200 User’s Guide

Using the ZyAIR Utility

2-15

Figure 2-13 WPA with RADIUS Application Example

Figure 2-14 WPA-PSK Authentication

Follow the instructions in the table to configure the WEP encryptions.

Table 2-6 WPA-PSK Authentication

FIELD DESCRIPTION

Authentication

Select WPA-PSK from the drop-down list box.

Advertising