Download Print this page

NTT docomo With Series Instruction Manual page 45

Hide thumbs Also See for With Series:

Advertisement

WPA2
WPA2 conforms to IEEE Standard 802.11i, improves WPA
authentication and maintains backward compatibility.
Using Advanced Encryption Standard (AES) as encryption
method, WPA2
authentication becomes essential for Wi-Fi
authentication today.
Enterprise and Personal are used for authentication of both
WPA
and WPA2 . Enterprise authenticates using 802.1x
and EAP and Personal authenticates using pre-shared key
(WPA/WPA2-PSK).
*3
EAP stands for Extensible Authentication Protocol. It is
authentication protocol used for confirming ID of network
device. WPA /WPA2
-Used for Enterprise authentication
EAP-TLS
Stands for Extensible Authentication Protocol Transport
Layer Security. It authenticates wireless LAN client using
digital certification on both of client and authentication server.
PEAPv0/EAP-MSCHAPv2
PEAP stands for Protected Extensible Authentication
Protocol. It creates encrypted SSL/TLS tunnel between a
client and an authentication server for transferring
authentication data such as password using 802.11 wireless
network and authenticates wireless LAN client using only
digital certification on the server. In this method, EAP-
MSCHAPv2 is executed through the encrypted SSL/TLS
tunnel.
*4
WMM stands for Wi-Fi Multimedia. It is QoS function
standards formulated by Wi-Fi Alliance based on
IEEE802.11e. It allocates order of priority to various traffic
within wireless LAN network.
*5
Using WPS function, it configures wireless LAN connection
settings (SSID, authentication method, encryption key, etc.)
by pushing a button or entering a PIN code.
Export Administration
Regulations
This product and its accessories may be under coverage of
the Export Administration Regulations of Japan ("Foreign
Exchange and Foreign Trade Control Laws" and the
related laws and regulations). And, they are also under
coverage of Export Administration Regulations of the U.S.
When exporting and reexporting this product and its
accessories, take necessary procedures on your
responsibility and expense. For details, contact Ministry of
Economy, Trade and Industry of Japan or US Department
of Commerce.
Intellectual Property Right
◆ Copyrights and portrait rights
Except for the case protected by copyright laws such as
personal use, use of the terminal to reproduce, alter, or
publicly transmit recorded pictures or sounds, or
copyrighted text, images, music or software downloaded
from websites without the copyright holder's authorization
is prohibited.
Note that taking photos or recordings at some
demonstrations, performances or exhibitions may be
prohibited even when only for personal use.
Avoid taking pictures of others with the terminal without
their consent or disclosing recorded pictures of others
without their consent to general public through Internet
websites etc., because they may infringe on portrait rights.
150
Appendix/Index

Advertisement

loading

This manual is also suitable for:

Arrows c f-03d