Linksys WET54GS5 manual Wpa Radius-Ttls

Page 33

Wireless-G Ethernet Bridge with 5-Port Switch

TTLS

TTLS is a mutual authentication method that uses digital certificates. Select TTLS from the EAP Type drop- down menu. Enter the Login name of your wireless network in the User ID field and the password in the Password field. Enter the Root Certificate in the field or click the Browse button to browse for it, then upload it.

EAP Type - The authentication method that your network uses. Select TTLS from the drop-down menu.

WPA Algorithm - The WPA algorithm used is TKIP.

User ID -Your User ID is the Login name of your wireless network. Enter the Login name of your wireless network in the User ID field.

Password - This is the password used for your wireless network. Enter the password in the Password field.

Root Certificate - Enter the root certificate you have installed to authenticate you on your wireless network or click the Browse button to browse for it. Click the Upload button to upload the certificate.

Click the Apply button to save your changes. If your page doesn’t automatically refresh itself, then click the Refresh button of your web browser. Click the View Log button to view a log.

Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility

Figure 7-10: WPA RADIUS-TTLS

27

Setup

Image 33
Contents Wireless- G Copyright and Trademarks How to Use this GuideTable of Contents FCC Statement Industry Canada Canada Appendix I Contact InformationInfrastructure Network List of Figures10 WPA RADIUS-TTLS Introduction What’s in this Guide? Wireless-G Ethernet Bridge with 5-Port Switch Planning Your Wireless Network Ad-Hoc versus Infrastructure ModeNetwork Topology Ad-Hoc Network Network LayoutBack Panel Front Panel Side Panel Power port is on the side panel. See Figure Connecting the Wireless-G Ethernet Bridge for Setup Wireless-G Ethernet Bridge with 5-Port Switch Welcome Setting Up the Wireless-G Ethernet BridgePassword Mode Settings Wireless Settings Security Settings 10 Confirmation Connecting the Wireless-G Ethernet Bridge for Network Use Wall Mount Placement OptionConnection to a Network Device Using the Wireless-G Ethernet Bridge Web-based Utility OverviewStarting the Web-based Utility LAN SetupSite Survey WEP Radius TLS Ttls WPA Radius 10 WPA RADIUS-TTLS 11 WPA Pre-Shared Key 13 Password Tab Wireless Advanced WirelessMAC Address Spanning Tree Protocol Switch TabQOS 17 Switch Table Tab Switch TableVlan Wireless-G Ethernet Bridge with 5-Port Switch 19 Rmon Statistics Tab Rmon StatisticsWireless-G Ethernet Bridge with 5-Port Switch Port Information Table Port Mirroring21 Access List Tab Access ListLAN Settings Wireless StatusWireless Settings StatisticsSnmp 24 Help Tab HelpCommon Problems and Solutions Appendix a TroubleshootingWeb-based Utility won’t open Frequently Asked QuestionsWhat is ad-hoc mode? What is ISM band? Appendix B Wireless Security Security PrecautionsSecurity Threats Facing Wireless Networks Appendix B Wireless Security Wireless-G Ethernet Bridge with 5-Port Switch Appendix C Upgrading Firmware Figure C-1 Firmware UpgradeAppendix D Windows Help Shared ResourcesNetwork Neighborhood/My Network Places Appendix E Glossary Wireless-G Ethernet Bridge with 5-Port Switch Wireless-G Ethernet Bridge with 5-Port Switch Wireless-G Ethernet Bridge with 5-Port Switch Wireless-G Ethernet Bridge with 5-Port Switch Wireless-G Ethernet Bridge with 5-Port Switch Wireless-G Ethernet Bridge with 5-Port Switch Security Feature Appendix F SpecificationsModel StandardsOperating Temp Warranty Year Limited WarrantyStorage Temp Operating HumidityLimited Warranty Appendix G Warranty InformationFCC Statement Appendix H Regulatory InformationIndustry Canada Canada FCC Radiation Exposure StatementAppendix I Contact Information