Linksys WMP54GR manual Eap-Tls

Page 33

Wireless-G PCI Adapter with RangeBooster

WPA Enterprise

WPA Enterprise features WPA security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) WPA Enterprise offers two authentication methods, EAP- TLS and PEAP, as well as two encryption methods, TKIP and AES, with dynamic encryption keys.

Authentication - Select the authentication method your network is using, EAP-TLS or PEAP.

EAP-TLS

If you selected EAP-TLS, enter the login name of your wireless network in the Login Name field. Enter the name of the authentication server in the Server Name field (this is optional). From the Certificate drop-down menu, select the certificate you have installed to authenticate you on your wireless network. Select the type of encryption, TKIP or AES, from the Encryption drop-down menu.

Click the Next button to continue or the Back button to return to the previous screen.

Figure 4-20: Wireless Security - WPA Enterprise Using

EAP-TLS

PEAP

If you selected PEAP, enter the login name of your wireless network in the Login Name field. Enter the password of your wireless network in the Password field. Enter the name of the authentication server in the Server Name field (this is optional). From the Certificate drop-down menu, select the certificate you have installed to authenticate you on your wireless network; if you want to use any certificate, keep the default setting, Trust Any. Then select the authentication method used inside the PEAP tunnel. Select the type of encryption, TKIP or AES, from the Encryption drop-down menu.

Click the Next button to continue or the Back button to return to the previous screen.

Figure 4-21: Wireless Security - WPA Enterprise Using

PEAP

Chapter 4: Using the Wireless Network Monitor

28

Create a New Profile

Image 33
Contents Wireless- G How to Use This User Guide Copyright and TrademarksWord definition Table of Contents Setup Wizard’s License Agreement Setup Wizard’s Welcome Screen10 Import a Profile Introduction WelcomeAdapter a device that adds network functionality to your PC What’s in this Guide? Wireless-G PCI Adapter with RangeBooster Network Topology Planning your Wireless NetworkRoaming Topology the physical layout of a networkNetwork Layout Setup Wizard’s License Agreement Starting the SetupSetting up the Adapter Connecting the AdapterEncryption encoding data transmitted in a network WEP Key Needed for ConnectionCongratulations 10 Network Settings Manual SetupWEP PSK2 WPA PersonalEAP-TLS WPA EnterpriseRadius 19 Confirm New Settings Accessing the Wireless Network Monitor Using the Wireless Network MonitorWireless Network Status screen Link InformationWireless Network Status More Information-Network Statistics Wireless Network StatisticsSite Information Site SurveyWPA-Personal Needed for Connection Profile Information Profiles12 Create a New Profile Create a New ProfileWPA Personal Needed for Connection 13 Available Wireless Network Wpa wi-fi protected access a wireless security protocol Using Tkip Temporal Key Integrity Protocol encryptionWhich can be used in conjunction with a Radius server 17 Wireless Security WEP 19 Wireless Security PSK2 EAP-TLS 22 Wireless Security Radius Using EAP-TLS 25 Congratulations Common Problems and Solutions Appendix a TroubleshootingWhat is the Ieee 802.11b standard? Frequently Asked QuestionsWhat is the Ieee 802.11g standard? What Ieee 802.11b features are supported?What is infrastructure mode? What is ad-hoc mode?What is roaming? What is ISM band?What is WEP? What is DSSS? What is FHSS? And what are their differences?What is WPA? What is RADIUS?Select Use Linksys Wireless Network Monitor Appendix B Using Windows XP Wireless ConfigurationFigure B-4 Available Wireless Network Figure B-6 Network Connection Wireless Security Appendix C Wireless Security Security PrecautionsSecurity Threats Facing Wireless Networks Appendix C Wireless Security Wireless-G PCI Adapter with RangeBooster Appendix D Windows Help Shared ResourcesNetwork Neighborhood/My Network Places Appendix E Glossary Wireless-G PCI Adapter with RangeBooster Wireless-G PCI Adapter with RangeBooster Appendix F Specifications Protocols802.11g Ofdm Storage Temp Operating HumidityStorage Humidity Limited Warranty Appendix G Warranty InformationFCC Statement Appendix H Regulatory InformationWireless-G PCI Adapter with Range Booster Wireless-G PCI Adapter with Range Booster Wireless-G PCI Adapter with Range Booster Wireless-G PCI Adapter with Range Booster Wireless-G PCI Adapter with Range Booster Appendix I Contact Information