Figure 5-34: Editing A Profile - Wireless Security - Wpa Enterprise - Eap-Tls; Figure 5-35: Editing A Profile - Wireless Security - Wpa Enterprise - Peap - Linksys WUSB200 User Manual

Business series wireless-g business usb network adapter with rangebooster
Hide thumbs Also See for WUSB200:
Table of Contents

Advertisement

Wireless-G Business USB Network Adapter with RangeBooster
WPA Enterprise
WPA/WPA2 Enterprise features WPA security used in coordination with a RADIUS server. (This should only be
used when a RADIUS server is connected to the Router.) WPA Enterprise offers two authentication methods,
EAP-TLS and PEAP, as well as two encryption methods, TKIP and AES, with dynamic encryption keys. WPA2
Enterprise offers two authentication methods, EAP-TLS and PEAP, but only AES encryption method is used.
Authentication - Select the authentication method your network is using, EAP-TLS or PEAP.
EAP-TLS
If you selected EAP-TLS, enter the login name of your wireless network in the Login Name field. Enter the
name of the authentication server in the Server Name field (this is optional). From the Certificate drop-down
menu, select the certificate you have installed to authenticate you on your wireless network. Select the type
of encryption, TKIP or AES, from the Encryption drop-down menu.
Click the Next button to continue or the Back button to return to the previous screen.
PEAP
If you selected PEAP, enter the login name of your wireless network in the Login Name field. Enter the
password of your wireless network in the Password field. Enter the name of the authentication server in the
Server Name field (this is optional). From the Certificate drop-down menu, select the certificate you have
installed to authenticate you on your wireless network; if you want to use any certificate, keep the default
setting, Trust Any. Then select the authentication method used inside the PEAP tunnel. Select the type of
encryption, TKIP or AES, from the Encryption drop-down menu.
Click the Next button to continue or the Back button to return to the previous screen.
Chapter 5: Using the Wireless Network Monitor
Editing a Profile
Figure 5-34: Editing a Profile - Wireless Security -
WPA Enterprise - EAP-TLS
Figure 5-35: Editing a Profile - Wireless Security -
WPA Enterprise - PEAP
36

Advertisement

Table of Contents
loading

Table of Contents