Setting security – Zoom 4410B User Manual
Page 10

2
Setting Security
We strongly recommend security, although you do not need to 
use it to get your wireless connection working. 
Important! You must first enable security on the the wireless 
access point. You then enable security on the adapter using the 
same configuration that you used for the access point. For 
example, if the wireless access point is configured for WPA2-
PSK, you must select WPA2-PSK security in the Wireless-G 
USB configuration software and enter the same encryption key. 
Select one of six ways to configure and implement security for 
your wireless network: 
• WPA2-PSK (WiFi ® Protected Access 2 Pre-Shared Key)
This is the option we recommend, if it is supported by the 
access point and the devices in your network. WPA2-PSK 
protects your communications with AES (Advanced 
Encryption Standard). Some access points permit a “mixed 
mode” network composed of both WPA and WPA2 wireless 
clients. 
WPA2-PSK requires you to enter an encryption key shared 
by the access point. 
• WPA PSK (WiFi ® Protected Access Pre-Shared Key)
If the devices in your network do not all support WPA2-PSK, 
select WPA-PSK. WPA-PSK protects your communications 
with TKIP (Temporal Key Integrity Protocol). 
10
Wireless-G USB Adapter
