ZyAIR G-100 User’s Guide

 

Table 2-5 WPA Authentication

 

 

 

 

FIELD

 

DESCRIPTION

 

 

 

 

Authentication

Select WPA from the drop-down list box.

 

 

 

 

Encryption Status

All unicast traffic is automatically encrypted by TKIP when WPA or WPA-PSK

 

Authentication is selected. See the section on Encryption for details about

 

Temporal Key Integrity Protocol (TKIP).

EAP Type

Select an EAP Type from the drop-down list box. See Types of EAP Authentication

 

in the Appendix of this User’s Guide for information on the fields listed below. The

 

choices are:

 

EAP-TLS

 

EAP-TTLS

 

EAP-MD5

 

EAP-PEAP

 

LEAP

 

 

 

 

Login Name

If you want all wireless stations to have to enter user names before access to the

 

wired network is allowed, type a Login Name.

 

 

 

 

Password

If you want all wireless stations to have to enter passwords before access to the

 

wired network is allowed, type a Password.

Certificate

This field is only available when you select EAP-TLSin the EAP Type field.

 

 

 

 

 

 

You must first have a wired connection to

 

 

a network and obtain the certificate(s) from a

 

 

certificate authority (CA). Consult your

 

 

network administrator for more information.

 

 

 

Validate Server

This field is not available when you select EAP-MD5or LEAP from the EAP Type

Certificate

list. The server presents a certificate to the client. After validating the identity of the

 

server, the client sends a different certificate to the server. Select the check box to

 

have your server validate this certificate.

 

 

TTLS Protocol/

Select a protocol from the drop-down list box. The choices are:

PEAP Protocol

EAP-TTLS

 

PAP

 

CHAP

 

MS CHAP

 

MS CHAP v2

 

EAP-PEAP

 

MD5 Challenge

 

EAP-GTC

 

MS CHAP v2

 

See the Types of EAP Authentication in the appendix for details.

 

 

OK

Click OK to apply the changes and close the screen.

2.10.3 Data Encryption with WPA-PSK

Select WPA-PSKfrom the Authentication drop-down list box to view the security configuration options.

2-14

Using the ZyAIR Utility