742874
40
Zoom out
Zoom in
Previous page
1/118
Next page
30
Select WPA-PSK (or WPA2-PSK, or Mixed WPA/WPA2-PSK) from the Security Mode drop-down list
menu, the following parameters appear. See the following figure.
Parameter description
Parameter
Description
Encryption Algorithm
The AP supports the following three encryption algorithms:
AES: Advanced Encryption Standard. This is newer Wi-Fi encryption solution used
by the new-and-secure WPA2 standard. It is more secure than TKIP.
TKIP: Temporal Key Integrity Protocol. This is an older encryption protocol
introduced with WPA. This option is recommended only when you have older
devices that can’t connect to a WPA2-PSK (AES) network.
AES&TKIP: It indicates that both AES and TKIP are supported.
Key
It indicates the key used for wireless clients to connect to the access point.
Key Update Interval
It indicates the interval at which a WPA key is updated. A shorter interval leads to
higher security.
WPA and WPA2
To address the key management weakness of WPA-PSK and WPA2-PSK, the WiFi Alliance puts
forward WPA and WPA2, which use 802.1x to authenticate devices and generate data encryption
oriented root keys. WPA and WPA2 use the root keys to replace the pre-shared keys that set
manually, but adopt the same encryption process as WPA-PSK and WPA2-PSK.
WPA and WPA2 uses 802.1x to authenticate devices and the login information of a device is
managed by the device. This effectively reduces the probability of information leakage. In addition,
each time a device connects to an AP that adopts the WPA or WPA2 security mode, the RADIUS
server generates a data encryption key and assigns it to the device, which makes it difficult for
attackers to obtain the key. These features of WPA and WPA2 security modes help increase network
security significantly, making WPA and WPA2 the preferred security modes of WiFi networks that
require high security.
Select WPA (or WAP2) from the Security Mode drop-down list menu, the following parameters
40


Need help? Post your question in this forum.

Forumrules


Report abuse

Libble takes abuse of its services very seriously. We're committed to dealing with such abuse according to the laws in your country of residence. When you submit a report, we'll investigate it and take the appropriate action. We'll get back to you only if we require additional details or have more information to share.

Product:

For example, Anti-Semitic content, racist content, or material that could result in a violent physical act.

For example, a credit card number, a personal identification number, or an unlisted home address. Note that email addresses and full names are not considered private information.

Forumrules

To achieve meaningful questions, we apply the following rules:

Register

Register getting emails for Tenda i24 at:


You will receive an email to register for one or both of the options.


Get your user manual by e-mail

Enter your email address to receive the manual of Tenda i24 in the language / languages: English as an attachment in your email.

The manual is 9,77 mb in size.

 

You will receive the manual in your email within minutes. If you have not received an email, then probably have entered the wrong email address or your mailbox is too full. In addition, it may be that your ISP may have a maximum size for emails to receive.

The manual is sent by email. Check your email

If you have not received an email with the manual within fifteen minutes, it may be that you have a entered a wrong email address or that your ISP has set a maximum size to receive email that is smaller than the size of the manual.

The email address you have provided is not correct.

Please check the email address and correct it.

Your question is posted on this page

Would you like to receive an email when new answers and questions are posted? Please enter your email address.



Info