Motorola WU830G manual Setting Security for a Wireless Network or a Profile

Page 29

SECTION 3

 

CONFIGURATION

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Network Authentication

Data Encryption

 

 

 

 

 

 

 

 

Option

Description

Option

Description

 

 

 

 

 

 

 

 

WPA-PSK

For infrastructure environments

TKIP

A network

 

 

 

without the RADIUS infrastructure.

 

key is used

 

 

 

WPA-PSK supports the use of a

 

(more

 

 

 

pre-shared key. WPA-PSK is the

 

secure).

 

 

 

next generation of wireless network

 

 

 

 

 

security for home and small office

 

 

 

 

 

environments.

 

 

 

 

 

 

 

 

 

 

WPA

The network operates in IEEE

TKIP with

A network

 

 

 

802.1x authentication mode. This

four EAP

key is used

 

 

 

mode is for environments with a

methods:

(more

 

 

 

Remote Access Dial-In User Service

TLS

secure).

 

 

 

(RADIUS) infrastructure.

TTLS

 

 

 

 

This authentication is usually used

 

 

 

 

PEAP

 

 

 

 

by enterprise business systems or

 

 

 

 

large corporations.

LEAP

 

 

 

 

In a RADIUS environment, various

 

 

 

 

 

 

 

 

 

Extensible Authentication Protocols

 

 

 

 

 

(EAPs) are supported. These may

 

 

 

 

 

include TLS, TTLS, PEAP, and

 

 

 

 

 

LEAP.

 

 

 

 

 

 

 

 

 

Setting Security for a Wireless Network or a Profile

To set up security for a selected wireless network or profile:

1Select a wireless network on the Site Monitor tab and click Connect or enter profile information on the Profile tab and click Set Security. The Motorola Security Configuration window is displayed.

2Select the Authentication.

3Select the Encryption Status.

4If necessary, enter additional information to complete the window. For additional information, refer to the topics on Open, Shared, WPA-PSK, and WPA Authentication.

5After completing the security information, click OK.

The following subsections describe the security windows for each authentication type.

3-12

WU830G

Image 29
Contents User Guide WU830G Wireless USB Adapter FCC Compliance Class B Digital Device Canada Industry Canada IC Contents Contents Overview Overview FeaturesUnderstanding Your User Guide Box ContentsOverview Section Simple Home Network Diagram Wireless Connections Front of USB Adapter Feature DescriptionUSB Adapter Physical Description Following illustration shows the back of the WU830G Back of USB AdapterEnterprise Business Users Before You BeginSecurity Options InstallationSmall Office/Home Office Users Network Authentication Data Encryption Option Description Installation SectionSecurity Example Device Configuration Setup Installing Your USB AdapterConfiguration Understanding the Antenna Icons ConfigurationConfiguration Section Field or Button Description Link Status InformationAP MAC Connecting to an Available Wireless Network Column Description Heading Creating a Network Profile Ssid Configuration Configuring Security Settings Select the Authentication Select the Encryption Status Setting Security for a Wireless Network or a ProfileEncryption Description Status Open AuthenticationShared Authentication Encryption Status Field Description WPA-PSK AuthenticationWPA Authentication Configuration MS Chap PAPChap EAP-GTC Name and Password for userProtocols are MD5 Challenge Removing a Network from the Profile List Viewing Product Information Removing the Wireless USB Adapter Configuration Contact Us Register the WU830G Hardware SolutionsStart button to ProgramsAccessoriesCommand Prompt TroubleshootingTroubleshooting Section Ascii CPE GlossaryBSS Dhcp Glossary SectionDMZ DNSEAP-LEAP DsssEAP-PEAP EAP-TLSGUI ESSFTP Host HexadecimalIcmp IeeeISP IsdnLAN LeapNIC MTUNAT Ping PcmciaPPP PptpRTS RadiusROM Smtp TCP/IP TCPUDP USBWAN VPNWAP WEPWWW WlanWPA Mgbi