INSTALLATION

SECTION 2

 

 

The following table lists the network authentication options and the data encryption options available for each type of authentication:

Network Authentication

Data Encryption

 

 

 

 

Option

Description

Option

Description

 

 

 

 

Open

With open authentication there is no

Disabled

No

 

data encryption.

 

encryption is

 

 

 

used.

 

 

 

 

Shared

The network operates in Shared

WEP 64-bit

A network

 

Key authentication mode when a

or

key is used.

 

network key is used for data

WEP 128-bit

 

 

encryption. WEP is the type of

 

 

 

encryption used. The Shared Key

 

 

 

authentication mode is the least

 

 

 

secure.

 

 

 

 

 

 

WPA-PSK

For infrastructure environments

TKIP

A network

 

without the RADIUS infrastructure.

 

key is used

 

WPA-PSK supports the use of a

 

(more

 

pre-shared key. WPA-PSK is the

 

secure).

 

next generation of wireless network

 

 

 

security for home and small office

 

 

 

environments.

 

 

 

 

 

 

WPA

The network operates in IEEE

TKIP with

A network

 

802.1x authentication mode. This

four EAP

key is used

 

mode is for environments with a

methods:

(more

 

Remote Access Dial-In User Service

TLS

secure).

 

(RADIUS) infrastructure.

TTLS

 

 

This authentication is usually used

 

 

PEAP

 

 

by enterprise business systems or

 

 

large corporations.

LEAP

 

 

In a RADIUS environment, various

 

 

 

 

 

Extensible Authentication Protocols

 

 

 

(EAPs) are supported. These may

 

 

 

include TLS, TTLS, PEAP, and

 

 

 

LEAP.

 

 

 

 

 

 

WU830G

2-3

Page 15
Image 15
Motorola WU830G manual Installation Section, Network Authentication Data Encryption Option Description