Figure 7-7: Radius-Tls - Linksys WET54GS5 User Manual

2.4ghz wireless-n ethernet bridge with 5-port switch
Hide thumbs Also See for WET54GS5:
Table of Contents

Advertisement

Wireless-G Ethernet Bridge with 5-Port Switch
• User ID and Password. A user identification and password are required for your security. Enter the ID in
the User ID field, then the password in the Password field.
When finished making your changes on this tab, click the Apply button to save these changes.
TLS
TLS is a mutual authentication method that uses digital certificates.Select TLS from the EAP Type drop-down
menu. Enter the Login name of your wireless network in the User ID field. Enter the User Certificate and Root
Certificate in the fields or click the Browse button to browse for it, then upload it.
• EAP Type - The authentication method that your network uses. Select TLS from the drop-down menu.
• User ID -Your User ID is the Login name of your wireless network. Enter the Login name of your wireless
network in the User ID field.
• User Certificate - Enter the user certificate you have installed to authenticate you on your wireless
network or click the Browse button to browse for it. Click the Upload button to upload the certificate.
• Root Certificate - Enter the root certificate you have installed to authenticate you on your wireless
network or click the Browse button to browse for it. Click the Upload button to upload the certificate.
Click the Apply button to save your changes. If your page doesn't automatically refresh itself, then click the
Refresh button of your web browser. Click the View Log button to view a log.
Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility
Setup

Figure 7-7: RADIUS-TLS

Encryption - Encoding data transmitted in a
network.
24

Advertisement

Table of Contents
loading

Table of Contents