Linksys WET54G V3 manual Radius-Ttls

Page 29

Wireless-G Ethernet Bridge

TTLS

TTLS is a mutual authentication method that uses digital certificates. Select TTLS from the EAP Type drop- down menu. Enter the Login name of your wireless network in the User ID field and the password in the Password field. Enter the Root Certificate in the field or click the Browse button to browse for it, then upload it.

EAP Type - The authentication method that your network uses. Select TTLS from the drop-down menu.

User ID -Your User ID is the Login name of your wireless network. Enter the Login name of your wireless network in the User ID field.

Password - This is the password used for your wireless network. Enter the password in the Password field.

Root Certificate - Enter the root certificate you have installed to authenticate you on your wireless network or click the Browse button to browse for it. Click the Upload button to upload the certificate.

Click the Apply button to save your changes. If your page doesn’t automatically refresh itself, then click the Refresh button of your web browser. Click the View Log button to view a log.

To save your changes, click the Apply button. Click the Cancel button to cancel your changes. Click the Help button for additional on-screen information.

Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility

Figure 7-10: RADIUS-TTLS

23

Setup

Image 29
Contents Wireless- G Copyright and Trademarks How to Use this GuideTable of Contents Wireless-G Ethernet Bridge Ad-Hoc Network Infrastructure Network10 RADIUS-TTLS Introduction What’s in this Guide? Wireless-G Ethernet Bridge Network Topology Planning Your Wireless NetworkAd-Hoc versus Infrastructure Mode Ad-Hoc Network Network LayoutLAN GettingtoKnowtheWireless-GEthernetBridgeFront Panel Connect the Power Connecting the Wireless-G Ethernet Bridge for SetupWelcome Setting Up the Wireless-G Ethernet BridgeList of Bridges Wireless Settings Security Settings-WEP 10 Confirmation Placement Options Connecting the Wireless-G Ethernet Bridge for Network UseConnection to a Network Device Wall Mount OptionStand Option Vertical PlacementStarting the Web-based Utility Using the Wireless-G Ethernet Bridge Web-based UtilityOverview Wireless SetupSite Survey WEP WEPWPA Pre-Shared Key MD5 RadiusRADIUS-TLS TLS10 RADIUS-TTLS Ttls11 Password Tab Advanced SettingsMAC Address Wireless Settings LAN SettingsStatus LAN Statistics14 Help Tab HelpCommon Problems and Solutions Appendix a TroubleshootingWeb-based Utility won’t open Frequently Asked QuestionsWhat is ad-hoc mode? What is ISM band? Security Threats Facing Wireless Networks Appendix B Wireless SecuritySecurity Precautions Appendix B Wireless Security Wireless-G Ethernet Bridge Appendix C Upgrading Firmware Figure C-1 Firmware UpgradeNetwork Neighborhood/My Network Places Appendix D Windows HelpShared Resources Appendix E Glossary Wireless-G Ethernet Bridge Wireless-G Ethernet Bridge Wireless-G Ethernet Bridge Wireless-G Ethernet Bridge Wireless-G Ethernet Bridge Appendix F Specifications Storage Temp Warranty Year LimitedOperating Humidity Storage HumidityLimited Warranty Appendix G Warranty InformationFCC Statement Appendix H Regulatory InformationIndustry Canada Canada EC Declaration of Conformity EuropeFrance Safety NoticesAppendix I Contact Information