User's Manual
Table Of Contents
- User’s Guide
- Copyright
- Certifications
- ZyXEL Limited Warranty
- Safety Warnings
- Customer Support
- Table of Contents
- List of Figures
- List of Tables
- Preface
- Getting Started
- Tutorial
- Wireless LAN Network
- ZyXEL Utility Configuration
- Maintenance
- Troubleshooting
- Product Specifications
- Management with Wireless Zero Configuration
- Wireless Security
- Types of EAP Authentication
- EAP-MD5 (Message-Digest Algorithm 5)
- EAP-TLS (Transport Layer Security)
- EAP-TTLS (Tunneled Transport Layer Service)
- PEAP (Protected EAP)
- LEAP
- Dynamic WEP Key Exchange
- WPA and WPA2
- Encryption
- User Authentication
- WPA(2)-PSK Application Example
- WPA(2) with RADIUS Application Example
- Security Parameters Summary
- Setting up Your Computer’s IP Address
- Index
ZyXEL AG-120 User’s Guide
72 Appendix B Management with Wireless Zero Configuration
Authentication Properties
Select an EAP authentication type in the Wireless (network) properties: Authentication
screen and click the Properties button to display the following screen.
Protected EAP Properties
Figure 47 Windows XP: Protected EAP Properties
Authenticate as
computer when
computer
information is
available
Select this check box to have the computer send its information to the network for
authentication when a user is not logged on.
Authenticate as
guest when user
or computer
information is
unavailable
Select this check box to have the computer access to the network as a guest when
a user is not logged on or computer information is not available.
OK Click OK to save your changes.
Cancel Click Cancel to leave this screen without saving any changes you may have made.
Table 23 Windows XP: Wireless (network) properties: Authentication (continued)
LABEL DESCRIPTION