Figure 6-22: Wireless Security - Wpa Enterprise Using Eap-Tls Settings; Figure 6-23: Wireless Security - Wpa Enterprise Using Eap-Ttls Settings - Linksys HP200 User Manual

Home wireless-g pc card
Table of Contents

Advertisement

Home Wireless-G PC Card
Authentication - Select the authentication method your network is using, EAP-TLS, EAP-TTLS, EAP-PEAP,
or LEAP. Then proceed to the appropriate instructions.
EAP-TLS
If you selected EAP-TLS, enter the login name of your wireless network in the Login Name field. From the
Certificate drop-down menu, select the certificate you have installed to authenticate you on your wireless
network.
Click the Next button to continue. Click the Back button to return to the previous screen.
EAP-TTLS
If you selected EAP-TTLS, enter the login name of your wireless network in the Login Name field. Enter the
password of your wireless network in the Password field. From the TTLS Protocol drop-down menu, select
the protocol you are using, PAP, CHAP, MS CHAP V2, or EAP.
Click the Next button to continue. Click the Back button to return to the previous screen.
Chapter 6: Using the Wireless Network Monitor
Creating a New Profile
Figure 6-22: Wireless Security - WPA Enterprise Using
EAP-TLS Settings
Figure 6-23: Wireless Security - WPA Enterprise Using
EAP-TTLS Settings
22

Advertisement

Table of Contents
loading

Table of Contents