EnGenius Technologies ESR9855G Network Router User Manual


 
57
57
6.2.4.3. WPA Personal (Wi-Fi Protected Access)
Select the WPA-Personal radio button if your wireless network uses WPA encryption. WPA (Wi-Fi Protected Access) was designed
to improve upon the security features of WEP (Wired Equivalent Privacy). The technology is designed to work with existing Wi-Fi products
that have been enabled with WEP. WPA provides improved data encryption through the Temporal Integrity Protocol (TKIP), which
scrambles the keys using a hashing algorithm and by adding an integrity checking feature which makes sure that keys haven’t been
tampered with.
WPA Mode: Select the Auto WPA / WPA2 from the drop-down list.
Cipher Type: Select TKIP and AES as the cipher suite. The encryption algorithm used to secure the data communication. TKIP. Use
TKIP only. TKIP (Temporal Key Integrity Protocol) provides per-packet key generation and is based on WEP. AES. Use AES only.
AES (Advanced Encryption Standard) is a very secure block based encryption. Note that, if the bridge uses the AES option, the bridge
can associate with the access point only if the access point is also set to use only AES. TKIP and AES. The bridge negotiates the
cipher type with the access point, and uses AES when available.
Group Key Update Interval: Specify the number of seconds before the group key used for broadcast and multicast data is changed.
Pre-Shared Key: The key is entered as a pass-phrase of up to 63 alphanumeric characters in ASCII (American Standard Code for
Information Interchange) format at both ends of the wireless connection. It cannot be shorter than eight characters, although for proper
security it needs to be of ample length and should not be a commonly known phrase. This phrase is used to generate session keys
that are unique for each wireless client.
Click on the Save Changes button to store these settings.