Edimax EW-7722UTn V2 User Manual page 32

Wireless network card
Hide thumbs Also See for EW-7722UTn V2:
Table of Contents

Advertisement

Key Length
Key Index (advanced)
Network Key
Parameter
Confirm Network Key
EAP Type
computers within the network.
When you select the "WEP and "PASSPHRASE" and
this function will display in the current status of the
utility.
The keys are used to encrypt data transmitted in the
wireless network. Fill the text box by following the rules
below.
64-bit – Input 10-digit Hex values as the encryption
keys. For example: "0123456aef".
128-bit – Input 26-digit Hex values as the encryption
keys. For example: "01234567890123456789abcdef".
Select one of the four keys to be the data encryption
key.
Please enter network security key here to make sure
the password is correct.
Description
Please enter network security key here again.
GTC – GTC is an authentication protocol which allows
the exchange of clear text authentication credentials
across the network.
TLS – TLS is the most secure of the EAP protocols but
not easy to use. It requires that digital certificates be
exchanged in the authentication phase. The server
presents a certificate to the client. After validating the
server‟s certificate, the client presents a client
certificate to the server for validation.
LEAP – LEAP is a pre-EAP, Cisco-proprietary protocol,
with many of the features of EAP protocols. Cisco
controls the ability of other vendors to implement this
protocol, so it should be selected for use only when
limited vendor choice for client, access-point, and
server products is not a concern. When you have set
up LEAP authentication, you have to enter the user
name and password of your computer.
PEAP & TTLS – PEAP and TTLS are similar and
easier than TLS in that they specify a stand-alone
authentication protocol be used within an encrypted
tunnel. TTLS supports any protocol within its tunnel,
27

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ew-7612uan v2

Table of Contents