beautypg.com

Authentication and security – Asus WL-530g User Manual

Page 9

background image

English

ASUS Pocket Wireless Router

9

Quick Setup

Authentication and Security

Click Wireless on the menu to reveal a submenu.

This field enables you to set different
authentication methods which determine
different encryption schemes. If all your clients
support WPA, using “WPA-PSK” is
recommended for better security.

WPA Encryption

When “WPA-PSK” authentication
method is used, the newly proposed
TKIP (Temporal Key Integrity
Protocol) encryption schemes are
applied.

TKIP: TKIP uses an encryption
algorithm, which is more stringent
than the WEP algorithm and also uses
existing WLAN calculation facilities
to perform encryption operations.
TKIP verifies the security
configuration after the encryption keys are determined.

WPA Pre-Shared Key

Selecting “TKIP” in the WPA Encryption, this field is used as a password
to begin the encryption process. Note: 8 to 63 characters are required.