•
•802.1x
Based on the selected security type, you can configure either a network security key or specify and configure a network authentication method. If you specify
•Choose a network authentication method Select an Extensible Authentication Protocol (EAP) method and click Settings to configure the EAP type as needed.
•Cache user information for subsequent connections to this network Specifies that when the user logs off, the user credential data is removed from the registry. The result is that when the next user logs on, they will be prompted for their credentials (such as user name and password).
If you specify the use of
You do not need to configure a network security key for the