EasyManua.ls Logo

Linksys WPC54G - Figure 4-26: Wireless Security - WPA-Enterprise - EAP-TLS; Figure 4-27: Wireless Security - WPA-Enterprise - PEAP

Linksys WPC54G
475 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
17
Chapter 4: Setting up and Connecting the Wireless-G Notebook Adapter
Setting up the Adapter
Wireless-G Notebook Adapter or Wirless-G Notebook Adapter with SpeedBooster
WPA-Enterprise
WPA-Enterprise features WPA security used in coordination with a RADIUS server. (This should only be used
when a RADIUS server is connected to the Router.) WPA-Enterprise offers two authentication methods, EAP-
TLS and PEAP, as well as two encryption methods, TKIP and AES, with dynamic encryption keys.
Authentication - Select the authentication method your network is using, EAP-TLS or PEAP.
EAP-TLS
If you selected EAP-TLS, enter the login name of your wireless network in the Login Name field. Enter the
name of the authentication server in the Server Name field (this is optional). From the Certificate drop-down
menu, select the certificate you have installed to authenticate you on your wireless network. Select the type
of encryption, TKIP or AES, from the Encryption drop-down menu.
Click the Next button to continue or the Back button to return to the previous screen.
PEAP
If you selected PEAP, enter the login name of your wireless network in the Login Name field. Enter the
password of your wireless network in the Password field. Enter the name of the authentication server in the
Server Name field (this is optional). From the Certificate drop-down menu, select the certificate you have
installed to authenticate you on your wireless network; if you want to use any certificate, keep the default
setting, Trust Any. Then select the authentication method used inside the PEAP tunnel. Select the type of
encryption, TKIP or AES, from the Encryption drop-down menu.
Click the Next button to continue or the Back button to return to the previous screen.
Figure 4-26: Wireless Security - WPA-Enterprise - EAP-TLS
Figure 4-27: Wireless Security - WPA-Enterprise - PEAP

Table of Contents

Related product manuals