Linksys WET54GS5 manual Ttls

Page 31

Wireless-G Ethernet Bridge with 5-Port Switch

TTLS

TTLS is a mutual authentication method that uses digital certificates. Select TTLS from the EAP Type drop- down menu. Enter the Login name of your wireless network in the User ID field and the password in the Password field. Enter the Root Certificate in the field or click the Browse button to browse for it, then upload it.

EAP Type - The authentication method that your network uses. Select TTLS from the drop-down menu.

User ID -Your User ID is the Login name of your wireless network. Enter the Login name of your wireless network in the User ID field.

Password - This is the password used for your wireless network. Enter the password in the Password field.

Root Certificate - Enter the root certificate you have installed to authenticate you on your wireless network or click the Browse button to browse for it. Click the Upload button to upload the certificate.

Click the Apply button to save your changes. If your page doesn’t automatically refresh itself, then click the

Refresh button of your web browser. Click the View Log button to view a log.

Figure 7-8: RADIUS-TTLS

EAP (Extensible Authentication Protocol) - A general authentication protocol used to control network access. Many specific authentication methods work within this framework.

Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility

25

Setup

Image 31
Contents Wireless- G Copyright and Trademarks How to Use this GuideTable of Contents FCC Statement Industry Canada Canada Appendix I Contact InformationInfrastructure Network List of Figures10 WPA RADIUS-TTLS Introduction What’s in this Guide? Wireless-G Ethernet Bridge with 5-Port Switch Ad-Hoc versus Infrastructure Mode Planning Your Wireless NetworkNetwork Topology Ad-Hoc Network Network LayoutBack Panel Front Panel Side Panel Power port is on the side panel. See Figure Connecting the Wireless-G Ethernet Bridge for Setup Wireless-G Ethernet Bridge with 5-Port Switch Welcome Setting Up the Wireless-G Ethernet BridgePassword Mode Settings Wireless Settings Security Settings 10 Confirmation Wall Mount Placement Option Connecting the Wireless-G Ethernet Bridge for Network UseConnection to a Network Device Overview Using the Wireless-G Ethernet Bridge Web-based UtilityStarting the Web-based Utility LAN SetupSite Survey WEP Radius TLS Ttls WPA Radius 10 WPA RADIUS-TTLS 11 WPA Pre-Shared Key 13 Password Tab Advanced Wireless WirelessMAC Address Spanning Tree Protocol Switch TabQOS 17 Switch Table Tab Switch TableVlan Wireless-G Ethernet Bridge with 5-Port Switch 19 Rmon Statistics Tab Rmon StatisticsWireless-G Ethernet Bridge with 5-Port Switch Port Information Table Port Mirroring21 Access List Tab Access ListStatistics Wireless StatusLAN Settings Wireless SettingsSnmp 24 Help Tab HelpCommon Problems and Solutions Appendix a TroubleshootingWeb-based Utility won’t open Frequently Asked QuestionsWhat is ad-hoc mode? What is ISM band? Security Precautions Appendix B Wireless SecuritySecurity Threats Facing Wireless Networks Appendix B Wireless Security Wireless-G Ethernet Bridge with 5-Port Switch Appendix C Upgrading Firmware Figure C-1 Firmware UpgradeShared Resources Appendix D Windows HelpNetwork Neighborhood/My Network Places Appendix E Glossary Wireless-G Ethernet Bridge with 5-Port Switch Wireless-G Ethernet Bridge with 5-Port Switch Wireless-G Ethernet Bridge with 5-Port Switch Wireless-G Ethernet Bridge with 5-Port Switch Wireless-G Ethernet Bridge with 5-Port Switch Wireless-G Ethernet Bridge with 5-Port Switch Standards Appendix F SpecificationsSecurity Feature ModelOperating Humidity Warranty Year Limited WarrantyOperating Temp Storage TempLimited Warranty Appendix G Warranty InformationFCC Radiation Exposure Statement Appendix H Regulatory InformationFCC Statement Industry Canada CanadaAppendix I Contact Information