Motorola WU830G Installation Section, Network Authentication Data Encryption Option Description

Page 15

INSTALLATION

SECTION 2

 

 

The following table lists the network authentication options and the data encryption options available for each type of authentication:

Network Authentication

Data Encryption

 

 

 

 

Option

Description

Option

Description

 

 

 

 

Open

With open authentication there is no

Disabled

No

 

data encryption.

 

encryption is

 

 

 

used.

 

 

 

 

Shared

The network operates in Shared

WEP 64-bit

A network

 

Key authentication mode when a

or

key is used.

 

network key is used for data

WEP 128-bit

 

 

encryption. WEP is the type of

 

 

 

encryption used. The Shared Key

 

 

 

authentication mode is the least

 

 

 

secure.

 

 

 

 

 

 

WPA-PSK

For infrastructure environments

TKIP

A network

 

without the RADIUS infrastructure.

 

key is used

 

WPA-PSK supports the use of a

 

(more

 

pre-shared key. WPA-PSK is the

 

secure).

 

next generation of wireless network

 

 

 

security for home and small office

 

 

 

environments.

 

 

 

 

 

 

WPA

The network operates in IEEE

TKIP with

A network

 

802.1x authentication mode. This

four EAP

key is used

 

mode is for environments with a

methods:

(more

 

Remote Access Dial-In User Service

TLS

secure).

 

(RADIUS) infrastructure.

TTLS

 

 

This authentication is usually used

 

 

PEAP

 

 

by enterprise business systems or

 

 

large corporations.

LEAP

 

 

In a RADIUS environment, various

 

 

 

 

 

Extensible Authentication Protocols

 

 

 

(EAPs) are supported. These may

 

 

 

include TLS, TTLS, PEAP, and

 

 

 

LEAP.

 

 

 

 

 

 

WU830G

2-3

Image 15
Contents User Guide WU830G Wireless USB Adapter FCC Compliance Class B Digital Device Canada Industry Canada IC Contents Contents Overview Overview FeaturesBox Contents Overview SectionUnderstanding Your User Guide Simple Home Network Diagram Wireless Connections Feature Description USB Adapter Physical DescriptionFront of USB Adapter Following illustration shows the back of the WU830G Back of USB AdapterEnterprise Business Users Before You BeginInstallation Small Office/Home Office UsersSecurity Options Network Authentication Data Encryption Option Description Installation SectionSecurity Example Device Configuration Setup Installing Your USB AdapterConfiguration Understanding the Antenna Icons ConfigurationConfiguration Section Field or Button Description Link Status InformationAP MAC Connecting to an Available Wireless Network Column Description Heading Creating a Network Profile Ssid Configuration Configuring Security Settings Select the Authentication Select the Encryption Status Setting Security for a Wireless Network or a ProfileEncryption Description Status Open AuthenticationShared Authentication Encryption Status Field Description WPA-PSK AuthenticationWPA Authentication Configuration PAP ChapMS Chap Name and Password for user Protocols are MD5 ChallengeEAP-GTC Removing a Network from the Profile List Viewing Product Information Removing the Wireless USB Adapter Configuration Contact Us Register the WU830G Hardware SolutionsStart button to ProgramsAccessoriesCommand Prompt TroubleshootingTroubleshooting Section Ascii Glossary BSSCPE DNS Glossary SectionDhcp DMZEAP-TLS DsssEAP-LEAP EAP-PEAPESS FTPGUI Ieee HexadecimalHost IcmpLeap IsdnISP LANMTU NATNIC Pptp PcmciaPing PPPRadius ROMRTS Smtp USB TCPTCP/IP UDPWEP VPNWAN WAPWlan WPAWWW Mgbi