Linksys WPC54GS User Guide - Page 33

EAP-PEAP, Validate server cerificate, EAP-PEAP Authentication, LEAP

Page 33 highlights

Wireless-G Notebook Adapter with SpeedBooster EAP-PEAP Enter the Login name of your wireless network in the Login Name field. Enter the password of your wireless network in the Password field. Select Validate server cerificate to make sure that the certificate for the server is valid. Then, select the Peap Inner EAP from the drop-down menu. Click the Next button to continue. Click the Back button to return to the previous screen. LEAP Enter the Login name of your wireless network in the Login Name field. Enter the password of your wireless network in the Password field. Click the Next button to continue. Click the Back button to return to the previous screen. Figure 6-28: EAP-PEAP Authentication Chapter 6: Using the Wireless Network Monitor Creating a New Profile Figure 6-29: LEAP Authentication 28

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54

28
Chapter 6: Using the Wireless Network Monitor
Creating a New Profile
Wireless-G Notebook Adapter with SpeedBooster
EAP-PEAP
Enter the Login name of your wireless network in the
Login Name
field. Enter the password of your wireless
network in the
Password
field. Select
Validate server cerificate
to make sure that the certificate for the
server is valid. Then, select the
Peap Inner EAP
from the drop-down menu.
Click the
Next
button to continue. Click the
Back
button to return to the previous screen.
LEAP
Enter the Login name of your wireless network in the
Login Name
field. Enter the password of your wireless
network in the
Password
field.
Click the
Next
button to continue. Click the
Back
button to return to the previous screen.
Figure 6-28: EAP-PEAP Authentication
Figure 6-29: LEAP Authentication