Linksys WET54G V3 manual Radius-Tls

Page 28

Wireless-G Ethernet Bridge

TLS

TLS is a mutual authentication method that uses digital certificates.Select TLS from the EAP Type drop-down menu. Enter the Login name of your wireless network in the User ID field. Enter the User Certificate and Root Certificate in the fields or click the Browse button to browse for it, then upload it.

EAP Type - The authentication method that your network uses. Select TLS from the drop-down menu.

User ID -Your User ID is the Login name of your wireless network. Enter the Login name of your wireless network in the User ID field.

User Certificate - Enter the user certificate you have installed to authenticate you on your wireless network or click the Browse button to browse for it. Click the Upload button to upload the certificate.

Root Certificate - Enter the root certificate you have installed to authenticate you on your wireless network or click the Browse button to browse for it. Click the Upload button to upload the certificate.

Click the Apply button to save your changes. If your page doesn’t automatically refresh itself, then click the Refresh button of your web browser. Click the View Log button to view a log.

Figure 7-9: RADIUS-TLS

TLS (Transport Layer Security) - A mutual authentication method that uses digital certificates.

EAP (Extensible Authentication Protocol) - A general authentication protocol used to control network access. Many specific authentication methods work within this framework.

Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility

22

Setup

Image 28
Contents Wireless- G How to Use this Guide Copyright and TrademarksTable of Contents Wireless-G Ethernet Bridge Infrastructure Network Ad-Hoc Network10 RADIUS-TTLS Introduction What’s in this Guide? Wireless-G Ethernet Bridge Ad-Hoc versus Infrastructure Mode Planning Your Wireless NetworkNetwork Topology Network Layout Ad-Hoc NetworkGettingtoKnowtheWireless-GEthernetBridge LANFront Panel Connecting the Wireless-G Ethernet Bridge for Setup Connect the PowerSetting Up the Wireless-G Ethernet Bridge WelcomeList of Bridges Wireless Settings Security Settings-WEP 10 Confirmation Connecting the Wireless-G Ethernet Bridge for Network Use Placement OptionsConnection to a Network Device Wall Mount OptionVertical Placement Stand OptionOverview Using the Wireless-G Ethernet Bridge Web-based UtilityStarting the Web-based Utility Setup WirelessSite Survey WEP WEPWPA Pre-Shared Key Radius MD5TLS RADIUS-TLSTtls 10 RADIUS-TTLSAdvanced Settings 11 Password TabMAC Address LAN Settings Wireless SettingsStatus LAN StatisticsHelp 14 Help TabAppendix a Troubleshooting Common Problems and SolutionsFrequently Asked Questions Web-based Utility won’t openWhat is ad-hoc mode? What is ISM band? Security Precautions Appendix B Wireless SecuritySecurity Threats Facing Wireless Networks Appendix B Wireless Security Wireless-G Ethernet Bridge Figure C-1 Firmware Upgrade Appendix C Upgrading FirmwareShared Resources Appendix D Windows HelpNetwork Neighborhood/My Network Places Appendix E Glossary Wireless-G Ethernet Bridge Wireless-G Ethernet Bridge Wireless-G Ethernet Bridge Wireless-G Ethernet Bridge Wireless-G Ethernet Bridge Appendix F Specifications Warranty Year Limited Storage TempOperating Humidity Storage HumidityAppendix G Warranty Information Limited WarrantyAppendix H Regulatory Information FCC StatementIndustry Canada Canada EC Declaration of Conformity EuropeSafety Notices FranceAppendix I Contact Information