Configuring the WPA-Enabled Wireless Access Point (Windows CE 5.0)

After typing the IP address for your WPA-enabled access point in the Web browser address bar, the Settings Summary page appears in the Web browser window. You are now ready to configure your access point.

Microsoft used a Buffalo Technology WLA-G54****** 54MBPS wireless bridge base station for this test scenario. The procedures in this document refer to Buffalo Technology-based hardware and software. If you use a different WPA-enabled access point, refer to the product-specific documentation.

To configure your wireless access point for pre-shared key authentication

  1. On the bottom of the Welcome to the AirStation page, choose Advanced.
  2. On the left column of the LAN setting page, choose Wireless.
  3. In the Wireless Setting table, in the ESS-ID row, select the Enter radio button, and type CEWPA.
  4. In the WPA-Configuration row, from the Network Authentication dropdown list, choose WPA-PSK.
  5. In the WPA Pre-Shared Key box, type a set of 8 to 63-digit characters.
  6. In the WPA Group Rekey Interval box, type 30.
  7. In the Type of encryption row, choose TKIP.
  8. In the ANY connection row, choose Allow. Leave the default value for all other settings.
  9. Choose Set.

For additional information about how to set up your wireless access points, refer to the product-specific documentation.

**The non-Microsoft software and hardware referenced in this document are included for illustrative purposes only.

Illustrations that use such third party software and hardware as examples are not intended to be an endorsement or recommendation of any of these products.

We provide this information only as a convenience for our customers for purposes of explaining a practical application and do not provide warranties of any kind, whether express, implied or statutory, including but not limited to the implied warranties of merchantability and/or fitness for a particular purpose.

See Also

Configuring the Wireless Access Points for a Network with a Security Infrastructure

Last updated on Thursday, February 02, 2006

Send Feedback on this topic to the authors

Feedback FAQs

© 2006 Microsoft Corporation. All rights reserved.