User Manual

Wireless 11n USB Adapter
A. Network Authentication
Select the Security tab in the screen above. To define the security mode, select the desired security
mode as follows. There are 7 types supported: Open System, Shared Key, WPA-PSK, WPA2-PSK,
and WPA 802.1X, WPA2 802.1X, WEP 802.1X, and you can select a type from the drop down list if
you click the button beside ”Network Authentication”.
Open System: enable an adapter to attempt authentication regardless of its WEP settings. It
will only associate with the access point if the WEP keys on both the adapter and the access
point match.
Shared-key: only allows the adapter to associate with access points that have the same WEP
key.
802.1x: This item appears while the environment is set to an Open authentication with WEP
encryption. Mark the checkbox to make the section available. The section is also available in
WPA and WPA2 authentication types.
Preshared Key(PSK): This is the shared secret between AP and STA. For WPA-PSK,
WPA2-PSK and WPA-NONE authentication mode, this field must be filled with characters
longer than 8 and less than 32 lengths. The following dialog appears if you have input invalid
values.
WEP Key: Only available when using WEP encryption algorithm. The key must match AP's
key. Only using the same cryptographic key to access the computer, the internet can storage,
and decryption the information from other computer.
B. Data Encryption:
Data encryption
There are 4 types supported: Disabled, WEP, TKIP and AES. The
available encryption selection will differ from the authentication type you
have chosen, the result is shown below:
Authentication
A
vailable Encryption Selection
Open System Disabled, WEP
Shared Key , WEP 802.1X WEP
WPA-PSK, WPA2-PSK, and WP
802.1X, WPA2 802.1X
TKIP, AES
Note: Select different Security Options, the configurations are different; you can select the
appropriate security option and configure the exact key as your need.
TKIP: "Temporary Key Integration communication Protocol", it provide each packet's key
mixture, message integration and key reconstruction mechanism. TKIP can use with personal
or the enterprise network validation.
- 68 -