Linksys WET54GS5 manual Tls

Models: WET54GS5

1 69
Download 69 pages 54.98 Kb
Page 30
Image 30

Wireless-G Ethernet Bridge with 5-Port Switch

User ID and Password. A user identification and password are required for your security. Enter the ID in the User ID field, then the password in the Password field.

When finished making your changes on this tab, click the Apply button to save these changes.

TLS

TLS is a mutual authentication method that uses digital certificates.Select TLS from the EAP Type drop-down menu. Enter the Login name of your wireless network in the User ID field. Enter the User Certificate and Root Certificate in the fields or click the Browse button to browse for it, then upload it.

EAP Type - The authentication method that your network uses. Select TLS from the drop-down menu.

User ID -Your User ID is the Login name of your wireless network. Enter the Login name of your wireless network in the User ID field.

User Certificate - Enter the user certificate you have installed to authenticate you on your wireless network or click the Browse button to browse for it. Click the Upload button to upload the certificate.

Root Certificate - Enter the root certificate you have installed to authenticate you on your wireless network or click the Browse button to browse for it. Click the Upload button to upload the certificate.

Click the Apply button to save your changes. If your page doesn’t automatically refresh itself, then click the

Refresh button of your web browser. Click the View Log button to view a log.

Figure 7-7: RADIUS-TLS

Encryption - Encoding data transmitted in a network.

Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility

24

Setup

Page 30
Image 30
Linksys WET54GS5 manual Tls