beautypg.com

Setting security – Zoom 4412A User Manual

Page 13

background image

Chapter 2: Setting Security

13

2

Setting Security

We strongly recommend security, although you do not need to
use it to get your wireless connection working.

Important!

You must first enable security on the the wireless

access point. You then enable security on the adapter using the
same configuration that you used for the access point. For
example, if the wireless access point is configured for WPA2-
PSK, you must select WPA2-PSK security in the Wireless-G PC
Card configuration software and enter the same encryption key.

Select one of five ways to configure and implement security for
your wireless network:

WPA2-PSK (WiFi ® Protected Access 2 Pre-Shared Key) is

the recommended option if it is supported by the access
point and the devices in your network. WPA2-PSK protects
your communications with AES (Advanced Encryption
S

tandard). Some access points permit a “mixed mode”

network composed of both WPA and WPA2 wireless clients.

WPA2-PSK requires you to enter an encryption key shared
by the access point.

WPA PSK (WiFi ® Protected Access Pre-Shared Key)

If the devices in your network do not all support WPA2-PSK,
select WPA-PSK. WPA-PSK protects your communications
with TKIP (Temporal Key Integrity Protocol).

This manual is related to the following products: