CONFIGURATION | SECTION 3 |
|
|
The following table lists the fields displayed when WPA authentication is used:
Field | Description |
Encryption | TKIP is the encryption algorithm used on the |
Status | packets. |
EAP Method | There are four different (Extensible Authentication |
| Protocol) EAP methods that you can select on this |
| window: |
This method requires a Login | |
| Name and Certificate issued by |
| the RADIUS server to which you |
| are connecting. |
| Together, the login name and the |
| certificate enable the RADIUS |
| server to authenticate your |
| identity. |
| You can also choose to |
| authenticate the identity of the |
| RADIUS server by enabling the |
| Validate Server Certificate |
| check box. |
|
|
This method requires a Login | |
| Name and Password. |
| You must also choose an |
| additional TTLS Protocol. The |
| TTLS protocol must match the |
| one on your target RADIUS |
| server. The four TTLS Protocols |
| are: |
| PAP |
| CHAP |
| MS CHAP |
| MS CHAP v2 |
| You can also choose to |
| authenticate the RADIUS server |
| identity by checking the Validate |
| Server Certificate check box. |
|
|
WU830G |