D-Link DWL-AG132 Manual - Page 5

D-Link DWL-AG132 Manual

Page 5 highlights

Introduction (continued) 802.1x: Authentication which is a first line of defense against intrusion. In the authentication process, the Authentication Server verifies the identity of the client attempting to connect to the network. Unfamiliar clients would be denied access. For home users that will not incorporate a RADIUS server in their network, the security for the DWL-G132, used in conjunction with other WPA-compatible 802.11 products, will still be much stronger than ever before. Utilizing the Pre-Shared Key mode of WPA, the DWL-G132 will obtain a new security key every time it connects to the 802.11 network. You only need to input your encryption information once in the configuration menu. No longer will you have to manually input a new WEP key frequently to ensure security. With the DWL-G132, you will automatically receive a new key every time you connect, vastly increasing the safety of your communication. 5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49

5
For
home users that will
not incorporate a RADIUS server in their network, the
security for the DWL-G132, used in conjunction with other WPA-compatible
802.11 products, will still be much stronger than ever before. Utilizing the
Pre-Shared Key mode
of WPA, the DWL-G132 will obtain a new security key
every time it connects to the 802.11 network. You only need to input your
encryption information once in the configuration menu. No longer will you have
to manually input a new WEP key frequently to ensure security. With the
DWL-G132, you will automatically receive a new key every time you connect,
vastly increasing the safety of your communication.
Introduction (continued)
802.1x: Authentication
which is a first line of defense against intrusion. In the
authentication process, the Authentication Server
verifies the identity of
the client attempting to connect to the network. Unfamiliar clients would
be denied access.