Owner's manual
ASUS WLAN Adapter 35
Chapter 3 - Software Reference
Chapter 3
Software Reference
Cong - Authentication
This tab allows you to set the security settings to match those of your AP. It is
congurable only if you have set Network Authentication to WPA or WPA2 in
Cong-Encryption tab.
Authentication Type
The authentication type methods include:
PEAP:
PEAP (Protected Extensible
Authentication Protocol) authentication is a
version of Extensible Authentication Protocol
(EAP). EAP ensures mutual authentication
between a wireless client and a server that
resides at the network operations center.
TLS/Smart Card:
TLS (Transport Layer
Security) authentication is used to create an encrypted tunnel and achieve
server-side authentication in a manner similar to Web server authentication
using Secure Sockets Layer (SSL) protocol. This method uses digital
certicates to verify the identity of a client and server.
TTLS:
TTLS authentication uses certicates to authenticate the server, while
maintaining similar security properties to TLS such as mutual authentication
and a shared condentiality for session WEP key.
LEAP:
LEAP (Light Extensible Authentication Protocol) authentication is a
version of Extensible Authentication Protocol (EAP). EAP ensures mutual
authentication between a wireless client and a server that resides at the
network operations center.
Md5-challenge:
Md5-challenge is a one-way encryption algorithm that uses
usernames and passwords. This method does not support key management,
but require a preset key.