22 ASUS WLAN Adapter
Chapter 3 - Software Reference
Chapter 3
Software Reference
Survey - Site SurveyUse the Site Survey tab to view statistics
on the wireless networks available to the
WLAN Adapter and their parameters.
• SSID: The SSID of the available
networks.
• Channel: The channel used by each
network.
Cong - AuthenticationThis tab allows you to set the security settings to match those of your AP. It is
congurable only if you have set Network Authentication to WPA or WPA2 in
Cong-Encryption tab.
Authentication Type
The authentication type methods
include:
PEAP: PEAP (Protected Extensible
Authentication Protocol) authentication
is a version of Extensible Authentication
Protocol (E AP). EAP en sures mutual
authentication between a wireless client
and a server that resides at the network
operations center.
TLS/Smart Card: TLS (Transport Layer Security) authentication is used to
create an encrypted tunnel and achieve server-side authentication in a manner
similar to Web server authentication using Secure Sockets Layer (SSL)
protocol. This method uses digital certicates to verify the identity of a client
and server.
TTLS: TTLS authentication uses certicates to authenticate the server, while
maintaining similar security properties to TLS such as mutual authentication
and a shared condentiality for session WEP key.
LEAP: LEAP (Light Extensible Authentication Protocol) authentication is a
version of Extensible Authentication Protocol (EAP). EAP ensures mutual
authentication between a wireless client and a server that resides at the
network operations center.
Md5-challenge: Md5-challenge is a one-way encrypting algorithm that uses
usernames and passwords. This method does not support key management,
but require a preset key.