See the following table of acceptable combinations:
|
| Encryption | ||
Authentication | WEP |
| WPA, WPA (TKIP), WPA2 | |
Open | Static |
| No | |
Shared |
| |||
|
|
| ||
|
|
|
| |
PSK |
|
|
| |
LEAP |
|
|
| |
|
|
|
| |
PEAP | Dynamic |
| Yes | |
|
| |||
|
|
| ||
TLS* |
|
|
| |
|
|
|
| |
TTLS |
|
|
| |
|
|
|
|
|
| Encryption | ||
Authentication | WEP |
| WPA, WPA (TKIP), WPA2 | |
Open | Static |
| No | |
Shared |
| |||
|
|
| ||
|
|
|
| |
PSK |
|
|
| |
LEAP |
|
|
| |
|
|
|
| |
PEAP | Dynamic |
| Yes | |
|
| |||
|
|
| ||
TLS* |
|
|
| |
|
|
|
| |
TTLS |
|
|
| |
|
|
|
|