Gigabyte GN-WBKG User Manual - Page 24

Authentication, Security, Secure Key, Setting, 1X Enabled, 1-2-1. Authentication and Security,

Page 24 highlights

Figure 3-5. Authentication and Security Table 3-1 Authentication Type Security Secure Key Setting Open None None WEP Key Shared WEP Key WPA TKIP None AES None WPA-PSK TKIP WPA-PSK Key AES WPA-PSK Key LEAP None None 802.1X Enabled YES YES YES NO NO 3-1-2-1. Authentication and Security Authentication - Before a station connects to a SSID, the authentication type used by the SSID must be known. Authentication types include OPEN SYSTEM, WAP, WAP-PSK , LEAP and SHARED. Security - To prevent unauthorized access to data transmitted on the network, WLAN card provide a data encryption of high security. The access point must have the same password and encryption to connect with you. Different authentication types have different level of security. Please refer to Table 3-1. WEP Encryption - To activate the WEP Encryption, choose WEP Encryption from the drop-down menu in the Encryption field. Then follow instructions below: 21

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35

21
Figure 3-5.
Authentication and Security
Table 3-1
Authentication
Type
Security
Secure Key
Setting
802.1X Enabled
None
None
Open
WEP
Key
YES
Shared
WEP
Key
YES
TKIP
None
WPA
AES
None
YES
TKIP
WPA-PSK Key
WPA-PSK
AES
WPA-PSK Key
NO
LEAP
None
None
NO
3-1-2-1. Authentication and Security
Authentication –
Before a station connects to a SSID, the authentication type used by the SSID must be
known. Authentication types include OPEN SYSTEM, WAP, WAP-PSK , LEAP and
SHARED.
Security –
To prevent unauthorized access to data transmitted on the network, WLAN card provide a
data encryption of high security. The access point must have the same password and
encryption to connect with you. Different authentication types have different level of
security. Please refer to
Table 3-1
.
WEP Encryption –
To activate the WEP Encryption, choose
WEP Encryption
from the drop-down menu in
the Encryption field. Then follow instructions below: