Linksys WPC54GR User Manual page 33

Wireless-g notebook adapter with rangebooster
Hide thumbs Also See for WPC54GR:
Table of Contents

Advertisement

Available languages

Available languages

Wireless-G Notebook Adapter with RangeBooster
WPA Enterprise
WPA Enterprise features WPA security used in coordination with a RADIUS server. (This should only be used
when a RADIUS server is connected to the Router.) WPA Enterprise offers two authentication methods, EAP-
TLS and PEAP, as well as two encryption methods, TKIP and AES, with dynamic encryption keys.
Authentication - Select the authentication method your network is using, EAP-TLS or PEAP.
EAP-TLS
If you selected EAP-TLS, enter the login name of your wireless network in the Login Name field. Enter the
name of the authentication server in the Server Name field (this is optional). From the Certificate drop-down
menu, select the certificate you have installed to authenticate you on your wireless network. Select the type
of encryption, TKIP or AES, from the Encryption drop-down menu.
Click the Next button to continue or the Back button to return to the previous screen.
PEAP
If you selected PEAP, enter the login name of your wireless network in the Login Name field. Enter the
password of your wireless network in the Password field. Enter the name of the authentication server in the
Server Name field (this is optional). From the Certificate drop-down menu, select the certificate you have
installed to authenticate you on your wireless network; if you want to use any certificate, keep the default
setting, Trust Any. Then select the authentication method used inside the PEAP tunnel. Select the type of
encryption, TKIP or AES, from the Encryption drop-down menu.
Click the Next button to continue or the Back button to return to the previous screen.
Chapter 5: Using the Wireless Network Monitor
Create a New Profile
Figure 5-20: Wireless Security - WPA Enterprise Using
EAP-TLS
Figure 5-21: Wireless Security - WPA Enterprise Using
PEAP
27

Advertisement

Table of Contents
loading

Table of Contents