Wpa/Wpa2; Figure 16 Security Settings: Wpa/Wpa2; Table 7 Security Settings: Wpa/Wpa2 - ZyXEL Communications G-302 User Manual

802.11g wireless pci adapter
Table of Contents

Advertisement

ZyXEL G-302 v3 User's Guide
Table 6 Security Settings: WEP (continued)
LABEL
Next
Exit

3.2.2.2 WPA/WPA2

Note: You can use WPA and WPA2 with the G-302 v3 only in Microsoft Windows XP
or Windows 2000.

Figure 16 Security Settings: WPA/WPA2

The following table describes the labels in this screen.

Table 7 Security Settings: WPA/WPA2

LABEL
Encryption Type
Authentication
Type
Login Name
Password
Certification
Validate Server
Certificate
36
DESCRIPTION
Click Next to confirm your selections and advance to the Confirm Save screen.
Refer to
Section 3.2.3 on page
Click Exit to return to the Site Survey screen without saving.
DESCRIPTION
The encryption mechanisms used for WPA/WPA2 and WPA-PSK/WPA2-PSK are
the same. The only difference between the two is that WPA-PSK/WPA2-PSK uses
a simple common password, instead of user-specific credentials.
Select the encryption type (TKIP or AES) for data encryption.
Refer to
Section 2.2.3 on page 27
Select an authentication method from the drop down list. Options are TLS, TTLS
and PEAP.
Enter a user name.
This is the user name that you or an administrator set up on a RADIUS server.
This field is not available when you select TLS in the Authentication Type field.
Enter the password associated with the user name above.
This field is only available when you select TLS in the Authentication Type field.
Select a certificate used by the authentication server to authenticate the G-302 v3.
Note: You must first have a wired connection to a network and
obtain the certificate(s) from a certificate authority (CA).
Select the check box to check the certificate of the authentication server.
38.
for more information.
Chapter 3 ZyXEL Utility Configuration

Advertisement

Table of Contents
loading

This manual is also suitable for:

G-302 v3

Table of Contents