For WPA-PSK and WPA2-PSK modes, you need to enter the desired
value (8~63 characters). Data is encrypted using a 256Bit key derived
from this key. Other Wireless Stations must use the same key.
There are 5 methods in the drop-down list.
GTC - Generic Token Card. It was created by Cisco. It carries a
text challenge from the authentication server, and a reply which is
assumed to be generated by a security token. GTC does not pro-
tect the authentication data in any way.
TLS - Transport Layer Security. Provides for certificate-based and
mutual authentication of the client and the network. It relies on
client-side and server-side certificates to perform authentication
and can be used to dynamically generate user-based and ses-
sion-based WEP keys to secure subsequent communications
between the WLAN client and the access point.
LEAP - Lightweight Extensible Authentication Protocol. It is a
proprietary protocol from Cisco Systems developed to address the
security weaknesses common in WEP.
TTLS - Tunneled Transport Layer Security. This security method
provides for certificate-based, mutual authentication of the client
and network through an encrypted channel. Unlike EAP-TLS,
EAP-TTLS requires only server-side certificates.
PEAP - Protect Extensible Authentication Protocol. PEAP trans-
port securely authentication data by using tunneling between
PEAP clients and an authentication server. PEAP can authenti-
cate wireless LAN clients using only server-side certificates, thus
simplifying the implementation and administration of a secure
wireless LAN.