User's Manual

Shared—Authentication based on a WEP key exchange.
WPA/WPA2-
Personal
PSK
Encryption
WPA-Personal requires the support of TKIP (Temporal Key Integrity
Protocol) as an encryption method. This client utility and driver also support
AES (Advanced Encryption Standard) as a WPA-Personal encryption method.
WPA2-Personal requires the support of AES as an encryption method. This
client utility and driver also support TKIP as a WPA2-Personal encryption
method.
Authentication
Passsphrase—Enter the pre-shared key required for network access.
WPA/WPA2-
Enterprise
(RADIUS
server required)
Encryption
WPA-Enterprise requires TKIP (Temporal Key Integrity Protocol) as an
encryption method. This client utility and driver also support AES (Advanced
Encryption Standard) as a WPA-Enterprise encryption method.
WPA2-Enterprise requires AES as an encryption method. This client utility
and driver also support TKIP as a WPA2-Enterprise encryption method.
Authentication Method
Authentication using EAP TLS, or EAP TTLS, or EAP PEAP requiring
certificates which must be maintained in the authentication server and
supplicant.
Login Name
Network login provided by your network administrator.
Certificate
Select the security certificate that has been installed on this PC to provide server
authentication for this network name (SSID).
RADIUS
Authentication Method
Authentication using EAP TLS, or EAP TTLS, or EAP PEAP requiring
certificates which must be maintained in the authentication server and
supplicant.
Login Name
Network login provided by your network administrator.
Certificate
Select the security certificate that has been installed on this PC to provide server
authentication for this network name (SSID).
Wireless Security
Although security is important in any network, the characteristics of wireless networks can make
them vulnerable to attack. Unlike wired networks, which require a physical connection that can
be secured with lock and key, wireless networks require only a radio signal for communication,
and physical barriers do not provide protection. A concern since the introduction of the IEEE
Page 36 of 46 Installation and User Guide: Wireless LAN Client