Wpa, Wpa2 Authentication & Tkip, Aes Encryption; Wpa-Psk Authentication & Tkip, Aes Encryption - EnGenius EPI-9701 User Manual

Ieee802.11b/g/n wireless pci adapter
Table of Contents

Advertisement

EUB9701/9702 and EPI-9701series --IEEE802.11b/g/n Wireless LAN Client Adapter
alphanumeric or 26 hexadecimal characters.
Click on the Apply button to save the changes.
Show Password check box. If you want to make sure the accuracy of
password you type, click the Show Password box to check it.
3.4.2 WPA, WPA2 Authentication & TKIP, AES Encryption
WPA (Wi-Fi Protected Access) was designed to improve upon the security
features of WEP (Wired Equivalent Privacy). The technology is designed to work
with existing Wi-Fi products that have been enabled with WEP. WPA provides
improved data encryption through the Temporal Integrity Protocol (TKIP), which
scrambles the keys using a hashing algorithm and by adding an integrity-
checking feature which makes sure that keys haven't been tampered with. EAP
(Extensible Authentication Protocol) is an extension to the PPP protocol that
enables a variety of authentication protocols to be used. It passes through the
exchange of authentication messages, allowing the authentication software
stored in a server to interact with its counterpart in the client.
Authentication Type: Select WPA or WPA2 from the drop-down list.
Encryption: Select TKIP or AES from the drop-down list.
Click on the Apply button to save the changes.
Show Password check box. If you want to make sure the accuracy of
password you type, click the Show Password box to check it.
3.4.3 WPA-PSK Authentication & TKIP, AES Encryption
WPA – PSK (Pre-shared Key) is used in a Pre Shared Key mode that does not
require an authentication server. Access to the Internet and the rest of the
wireless network services is allowed only if the pre-shared key of the computer
matches that of the Access Point. This approach offers the simplicity of the WEP
key, but uses stronger TKIP encryption. EAP (Extensible Authentication Protocol)
is an extension to the PPP protocol that enables a variety of authentication
protocols to be used. It passes through the exchange of authentication messages,
allowing the authentication software stored in a server to interact with its
Version 1.0
28

Advertisement

Table of Contents
loading

Table of Contents