Setting security – Zoom 4410B User Manual
Page 10
2
Setting Security
We strongly recommend security, although you do not need to
use it to get your wireless connection working.
Important! You must first enable security on the the wireless
access point. You then enable security on the adapter using the
same configuration that you used for the access point. For
example, if the wireless access point is configured for WPA2-
PSK, you must select WPA2-PSK security in the Wireless-G
USB configuration software and enter the same encryption key.
Select one of six ways to configure and implement security for
your wireless network:
• WPA2-PSK (WiFi ® Protected Access 2 Pre-Shared Key)
This is the option we recommend, if it is supported by the
access point and the devices in your network. WPA2-PSK
protects your communications with AES (Advanced
Encryption Standard). Some access points permit a “mixed
mode” network composed of both WPA and WPA2 wireless
clients.
WPA2-PSK requires you to enter an encryption key shared
by the access point.
• WPA PSK (WiFi ® Protected Access Pre-Shared Key)
If the devices in your network do not all support WPA2-PSK,
select WPA-PSK. WPA-PSK protects your communications
with TKIP (Temporal Key Integrity Protocol).
10
Wireless-G USB Adapter