Advantek Networks AWN-MIMO-54RA user manual 3 802.1x Setting-Certification, Encryption Mode

Page 28

Encryption Mode:

None – Disable the Encryption mode.

WEP – Enabled the WEP Data Encryption. When the item is selected, you have to continue setting the WEP Key Length & the key Index.

TKIP – TKIP (Temporal Key Integrity Protocol) changes the temporal key every 10000 packets (a packet is a kind of message transmitted over a network). This insures much greater security than the standard WEP security.

AES – AES has been developed to ensure the highest degree of security and authenticity for digital information and it is the most advanced solution defined by IEEE 802.11i for the security in the wireless network.

Note: All devices in the network should use the same encryption method to ensure the communication.

WPA Pre-Shared Key: The WPA-PSK key can be from 8 to 64 characters and can be letters or numbers. This same key must be used on all of the wireless stations in the network.

WEP Key (Key1~Key4): The WEP keys are used to encrypt data transmitted in the wireless

network. There are two types of key length: 64-bit & 128-bit. Select the default encryption key form key1 to key4 by selected the radio button.

Fill the text box by following the rule below:

64-bit– Input 10-digit Hex values (in the A-F”, a-f, and 0-9 range) or 5-digit ASCII characters (including a-z and 0-9”) as the encryption keys. For example: “0123456aef” or “test1

128-bit– Input 26-digit Hex values (in the A-F”, a-f, and 0-9 range) or 13-digit ASCII characters (including a-z and 0-9”) as the encryption keys. For example: “01234567890123456789abcdef” or “administrator

3.3.3 802.1x Setting-Certification

The IEEE 802.1X specification describes a protocol that can be used for authenticating both clients and servers on a network. The authentication algorithms and methods are those provided by the Extensible Authentication Protocol (EAP), a method of authentication that has been in use for a number of years on networks that provide Point-to-Point Protocol (PPP) support as many Internet service providers and enterprises do.

When an AP acting as an authenticator detects a wireless station on the LAN, it sends an EAP-Request for the user’s identity to the device. (EAP, or the Extensible Authentication Protocol, is an authentication protocol that runs before network layer protocols transmit data over the link) In turn, the device responds with its identity, and the AP relays this identity to an authentication server, which is typically an external RADIUS server.

27

Image 28
Contents 802.11g, 54Mbps Mimo PCI Wireless Adapter User’s Manual FCC Warning Revision History Contents Wireless LAN has Activity ACT data being sent Light Status DescriptionHardware Diagram Installation Procedure Adjust the antenna position Place the PC as high as possibleInstall the Driver & Utility Page Page Page Page For Windows Vista x86 & x64 bit Page Choose Properties Æ click Device Manager To setup Wireless Network in Windows Vista Operation System Choose Connect to a network Page Wireless Network Configuration Utility Configuration utilityProfile 2Link Status 3Site Survey Configure the Profile Network Type Authentication and Security Page 3 802.1x Setting-Certification Encryption ModeAn example for MD5 Authentication 4 802.1x Setting-CA Server Tunneled Authentication4Statistics Wireless Mode AdvancedPage Click WMM Enable Click Apply QoSPage Enable WMM Power Save Click WMM Power Save Enable. And Click Setting… buttonEnable DLS Direct Link Setup Click Direct Link Setup Enable. And Click Apply buttonSetting of DLS indicates as follow Link Setup Describe DLS Status as followPage 7About Troubleshooting What is the Ieee 802.11g standard? What does Ieee 802.11 feature support?