Linksys WPC300N-RM User Guide - Page 34

Wireless Security - WPA Enterprise - EAP, Login Name, Server Name, Certificate

Page 34 highlights

Wireless-N Notebook Adapter WPA Enterprise WPA Enterprise features WPA security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) WPA Enterprise offers two authentication methods, EAPTLS and PEAP, as well as two encryption methods, TKIP and AES, with dynamic encryption keys. Authentication - Select the authentication method your network is using, EAP-TLS or PEAP. EAP-TLS If you selected EAP-TLS, enter the login name of your wireless network in the Login Name field. Enter the name of the authentication server in the Server Name field (this is optional). From the Certificate drop-down menu, select the certificate you have installed to authenticate you on your wireless network. Select the type of encryption, TKIP or AES, from the Encryption drop-down menu. Click the Next button to continue or the Back button to return to the previous screen. Figure 5-22: Wireless Security - WPA Enterprise - EAPTLS PEAP If you selected PEAP, enter the login name of your wireless network in the Login Name field. Enter the password of your wireless network in the Password field. Enter the name of the authentication server in the Server Name field (this is optional). From the Certificate drop-down menu, select the certificate you have installed to authenticate you on your wireless network; if you want to use any certificate, keep the default setting, Trust Any. Then select the authentication method used inside the PEAP tunnel. Select the type of encryption, TKIP or AES, from the Encryption drop-down menu. Click the Next button to continue or the Back button to return to the previous screen. Chapter 5: Using the Wireless Network Monitor Create a New Profile Figure 5-23: Wireless Security - WPA Enterprise - PEAP 28

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64

28
Chapter 5: Using the Wireless Network Monitor
Create a New Profile
Wireless-N Notebook Adapter
WPA Enterprise
WPA Enterprise features WPA security used in coordination with a RADIUS server. (This should only be used
when a RADIUS server is connected to the Router.) WPA Enterprise offers two authentication methods, EAP-
TLS and PEAP, as well as two encryption methods, TKIP and AES, with dynamic encryption keys.
Authentication - Select the authentication method your network is using, EAP-TLS or PEAP.
EAP-TLS
If you selected EAP-TLS, enter the login name of your wireless network in the
Login Name
field. Enter the
name of the authentication server in the
Server Name
field (this is optional). From the
Certificate
drop-down
menu, select the certificate you have installed to authenticate you on your wireless network. Select the type
of encryption, TKIP or AES, from the
Encryption
drop-down menu.
Click the
Next
button to continue or the Back button to return to the previous screen.
PEAP
If you selected PEAP, enter the login name of your wireless network in the
Login Name
field. Enter the
password of your wireless network in the
Password
field. Enter the name of the authentication server in the
Server Name
field (this is optional). From the
Certificate
drop-down menu, select the certificate you have
installed to authenticate you on your wireless network; if you want to use any certificate, keep the default
setting, Trust Any. Then select the authentication method used inside the PEAP tunnel. Select the type of
encryption, TKIP or AES, from the
Encryption
drop-down menu.
Click the
Next
button to continue or the Back button to return to the previous screen.
Figure 5-22: Wireless Security - WPA Enterprise - EAP-
TLS
Figure 5-23: Wireless Security - WPA Enterprise - PEAP