Linksys WUSB200 manual WPA Enterprise

Page 35

Wireless-G Business USB Network Adapter with RangeBooster

WPA Enterprise

WPA Enterprise features WPA security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) WPA Enterprise offers two authentication methods, EAP- TLS and PEAP, as well as two encryption methods, TKIP and AES, with dynamic encryption keys. WPA2 Enterprise offers two authentication methods, EAP-TLS and PEAP, but only AES encryption method is used.

Authentication - Select the authentication method your network is using, EAP-TLS or PEAP.

EAP-TLS

If you selected EAP-TLS, enter the login name of your wireless network in the Login Name field. Enter the name of the authentication server in the Server Name field (this is optional). From the Certificate drop-down menu, select the certificate you have installed to authenticate you on your wireless network. Select the type of encryption, TKIP or AES, from the Encryption drop-down menu.

Click the Next button to continue or the Back button to return to the previous screen.

PEAP

If you selected PEAP, enter the login name of your wireless network in the Login Name field. Enter the password of your wireless network in the Password field. Enter the name of the authentication server in the Server Name field (this is optional). Then select the authentication method used inside the PEAP tunnel. Select the type of encryption, TKIP or AES, from the Encryption drop-down menu.

Click the Next button to continue or the Back button to return to the previous screen.

Chapter 5: Using the Wireless Network Monitor

Figure 5-18: Creating a Profile - Manual Setup - Wireless Security - WPA Enterprise - EAP-TLS

Figure 5-19: Creating a Profile - Manual Setup -

Wireless Security - WPA Enterprise - PEAP

28

Create a New Profile

Image 35
Contents Wireless-G Business USB Network Adapter with RangeBooster Copyright and Trademarks How to Use this User GuideTable of Contents Windows XP Wireless Zero Configuration Appendix C Wireless SecurityLEDs List of FiguresCreating a Profile WEP Key Needed 43 Editing a Profile Congratulations Welcome IntroductionWhat’s in this User Guide? Wireless-G Business USB Network Adapter with RangeBooster Roaming Planning your Wireless NetworkNetwork Topology Network Layout LED Indicators Getting to Know the Wireless-G Business USB Network AdapterSetup Wizard’s Welcome Screen Starting the SetupSetup Wizard’s License Agreement Connecting the AdapterAvailable Wireless Network Setting up the AdapterWEP WPA2-Personal WPA-Personal10 Creating a Profile Manual Setup12 Ad-Hoc Mode Settings 14 Wireless Security WPA Personal TLS EAP-TLS WPA EnterpriseWPA2 Enterprise 20 Wireless Security Radius EAP-TLSRadius Link Information Using the Wireless Network MonitorAccessing the Wireless Network Monitor Using the Wireless Network MonitorsStatus Link Information Wireless Network StatusStatistics Link Information Wireless Network StatisticsProfile Information ProfilesCreate a New Profile Creating a Profile Available Wireless Network10 Creating a Profile WPA-Personal 12 Creating a Profile Manual Setup Network Settings 15 Creating a Profile Manual Setup Wireless Security WEP Using the Wireless Network Monitor Create a New Profile WPA Enterprise WPA2 Enterprise Radius 24 Creating a Profile Manual Setup Wireless Security Leap Editing a Profile 26 Creating a Profile Manual Setup Congratulations29 Editing a Profile Ad Hoc Mode WEP 32 Editing a Profile Wireless Security WPA Personal 35 Editing a Profile Wireless Security WPA Enterprise Peap 37 Editing a Profile Wireless Security WPA2 Enterprise Peap Radius EAP-TLS Leap 43 Editing a Profile Congratulations Site Information Site SurveyAdministration TroubleshootingLog in as the Access Points administrator Access Point Account49 Administration Security Monitor Account Classification Administrative Functions in the Wireless Network MonitorAP Classification ClassificationTrusted MAC Addresses Advanced SettingsAllowed Vendor List Configuration Channel Usage Allowed Channel ConfigurationSecurity Monitor Client Inventory AP InventoryAlerts Summary AlertAlert Details Alert List18 Security Monitor Alert Advice AdviceDisassociation attacking Alert Description Advice Legitimate AP Attacks or sniffing AP does not have any encryption Updated Client computers Ssid and MAC address 19 Security Monitor Windows Firewall Screen Windows FirewallCommon Problems and Solutions Appendix a TroubleshootingCan users turn off the pop-up alerts? Frequently Asked QuestionsWhat is the 802.11b standard? What is ISM band? What is WEP? Windows XP Wireless Zero Configuration Appendix B Windows XP Wireless Zero ConfigurationFigure B-4 Available Wireless Network Figure B-6 Network Connection Wireless Security Security Threats Facing Wireless Networks Appendix C Wireless SecuritySecurity Precautions Appendix C Wireless Security Wireless-G Business USB Network Adapter with RangeBooster Network Neighborhood/My Network Places Appendix D Windows HelpShared Resources Appendix E Glossary Wireless-G Business USB Network Adapter with RangeBooster Wireless-G Business USB Network Adapter with RangeBooster Wireless-G Business USB Network Adapter with RangeBooster Wireless-G Business USB Network Adapter with RangeBooster Appendix F Specifications Operating Humidity Unit Weight 15 oz 0.061 kg CertificationsOperating Temp Storage TempLimited Warranty Appendix G Warranty InformationFCC Statement Appendix H Regulatory InformationWireless-N Notebook Adapter Dual-Band Wireless-N Notebook Adapter Dual-Band Wireless-N Notebook Adapter Dual-Band Wireless-N Notebook Adapter Dual-Band Wireless-N Notebook Adapter Wireless-N Notebook Adapter Appendix I Contact Information