Edimax EW-7722UTn V2 Manual - Page 32

Peap & Ttls

Page 32 highlights

Key Length Key Index (advanced) Network Key Parameter Confirm Network Key EAP Type computers within the network. When you select the "WEP and "PASSPHRASE" and this function will display in the current status of the utility. The keys are used to encrypt data transmitted in the wireless network. Fill the text box by following the rules below. 64-bit - Input 10-digit Hex values as the encryption keys. For example: "0123456aef". 128-bit - Input 26-digit Hex values as the encryption keys. For example: "01234567890123456789abcdef". Select one of the four keys to be the data encryption key. Please enter network security key here to make sure the password is correct. Description Please enter network security key here again. GTC - GTC is an authentication protocol which allows the exchange of clear text authentication credentials across the network. TLS - TLS is the most secure of the EAP protocols but not easy to use. It requires that digital certificates be exchanged in the authentication phase. The server presents a certificate to the client. After validating the server‟s certificate, the client presents a client certificate to the server for validation. LEAP - LEAP is a pre-EAP, Cisco-proprietary protocol, with many of the features of EAP protocols. Cisco controls the ability of other vendors to implement this protocol, so it should be selected for use only when limited vendor choice for client, access-point, and server products is not a concern. When you have set up LEAP authentication, you have to enter the user name and password of your computer. PEAP & TTLS - PEAP and TTLS are similar and easier than TLS in that they specify a stand-alone authentication protocol be used within an encrypted tunnel. TTLS supports any protocol within its tunnel, 27

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54

27
computers within the network.
Key Length
When you select the
WEP and
PASSPHRASE
and
this function will display in the current status of the
utility.
The keys are used to encrypt data transmitted in the
wireless network. Fill the text box by following the rules
below.
64-bit
Input 10-digit Hex values as the encryption
keys. For example:
0123456aef
.
128-bit
Input 26-digit Hex values as the encryption
keys. For example:
01234567890123456789abcdef
.
Key Index (advanced)
Select one of the four keys to be the data encryption
key.
Network Key
Please enter network security key here to make sure
the password is correct.
Parameter
Description
Confirm Network Key
Please enter network security key here again.
EAP Type
GTC
GTC is an authentication protocol which allows
the exchange of clear text authentication credentials
across the network.
TLS
TLS is the most secure of the EAP protocols but
not easy to use. It requires that digital certificates be
exchanged in the authentication phase. The server
presents a certificate to the client. After validating the
server‟s certificate, the
client presents a client
certificate to the server for validation.
LEAP
LEAP is a pre-EAP, Cisco-proprietary protocol,
with many of the features of EAP protocols. Cisco
controls the ability of other vendors to implement this
protocol, so it should be selected for use only when
limited vendor choice for client, access-point, and
server products is not a concern. When you have set
up LEAP authentication, you have to enter the user
name and password of your computer.
PEAP & TTLS
PEAP and TTLS are similar and
easier than TLS in that they specify a stand-alone
authentication protocol be used within an encrypted
tunnel. TTLS supports any protocol within its tunnel,