Figure 3-16: Wireless Security - Wpa Enterprise - Eap-Tls; Figure 3-17: Wireless Security - Wpa Enterprise - Peap - Linksys WMP54GR User Manual

2.4ghz 802.11g wireless-g pci adapter with rangebooster
Hide thumbs Also See for WMP54GR:
Table of Contents

Advertisement

Available languages

Available languages

Wireless-G PCI Adapter with RangeBooster
WPA Enterprise
WPA Enterprise features WPA security used in coordination with a RADIUS server. (This should only be used
when a RADIUS server is connected to the Router.) WPA Enterprise offers two authentication methods, EAP-
TLS and PEAP, as well as two encryption methods, TKIP and AES, with dynamic encryption keys.
Authentication - Select the authentication method your network is using, EAP-TLS or PEAP.
EAP-TLS
If you selected EAP-TLS, enter the login name of your wireless network in the Login Name field. Enter the
name of the authentication server in the Server Name field (this is optional). From the Certificate drop-down
menu, select the certificate you have installed to authenticate you on your wireless network. Select the type
of encryption, TKIP or AES, from the Encryption drop-down menu.
Click the Next button to continue or the Back button to return to the previous screen.
PEAP
If you selected PEAP, enter the login name of your wireless network in the Login Name field. Enter the
password of your wireless network in the Password field. Enter the name of the authentication server in the
Server Name field (this is optional). From the Certificate drop-down menu, select the certificate you have
installed to authenticate you on your wireless network; if you want to use any certificate, keep the default
setting, Trust Any. Then select the authentication method used inside the PEAP tunnel. Select the type of
encryption, TKIP or AES, from the Encryption drop-down menu.
Click the Next button to continue or the Back button to return to the previous screen.
Chapter 3: Setting up and Connecting the Wireless-G PCI Adapter with RangeBooster
Setting up the Adapter

Figure 3-16: Wireless Security - WPA Enterprise - EAP-TLS

Figure 3-17: Wireless Security - WPA Enterprise - PEAP

13

Advertisement

Table of Contents
loading

Table of Contents