See the following table of acceptable combinations:
|
| Encryption | |
Authentication | WEP | WPA, WPA (TKIP), WPA2 | |
Open | Static | No | |
Shared | |||
|
| ||
PSK |
|
| |
|
|
| |
LEAP |
|
| |
PEAP | Dynamic | Yes | |
|
| ||
|
|
| |
TLS* |
|
| |
TTLS |
|
|
*Load the local key before enabling TLS.
Using a Web Browser
See the following table of acceptable combinations:
|
| Encryption | |
Authentication | WEP | WPA, WPA (TKIP), WPA2 | |
Open | Static | No | |
Shared | |||
|
| ||
PSK |
|
| |
|
|
| |
LEAP |
|
| |
PEAP | Dynamic | Yes | |
|
| ||
|
|
| |
TLS* |
|
| |
TTLS |
|
|
*Load the local key before enabling TLS.
Using a Web Browser