WPA-Personal/ WPA2-Personal
- Select this option to enable WPA Pre-Shared
Key under Infrastructure mode. It enables communication between your client and
APs using WPA-Personal/WPA2-Personal encryption mode.
WPA-Enterprise/ WPA2-Enterprise
- The network is operating in IEEE 802.1x
authentication mode. This mode is for environments with RADIUS (Remote Access
Dial-in User Service). In a RADIUS environment, three Extensible Authentication
Protocol (EAP) are supported, including PEAP, EPA/TLS, and LEAP.
Data encryption
For Open and Shared authentication mode, the configuration options of
encryption type are Disabled and WEP. For WPA-Personal and WPA-2 Personal
authentication modes, Temporal Key Integrity Protocol (TKIP) encryption and
Advanced Encryption Standard (AES) encryption are supported.
Disabled - Disable the encryption function.
WEP - WEP Key is used to encrypt your data before it is transmitted over air. You
can only connect and communicate with wireless devices that use the same WEP
keys.
TKIP - TKIP uses an encryption algorithm method that is more stringent than
the WEP algorithm. It also uses existing WLAN calculation facilities to perform
encryption. TKIP veries the security conguration after the encryption keys are
determined.
AES: AES is a symmetric 128-bit block encryption technique that works simultaneously on
multiple network layers.
Wireless network key
This option is enabled only if you select WPA-Personal or WPA2-PersonalWPA-Personal or WPA2-Personal
authentication mode. Select “TKIP” or “AES” in the encryption led as encryption
mode to begin the encryption proceed. Note: 8 to 64 characters are required in this
eld.
Wireless Network Key (WEP)
This option is congurable only if you enable WEP in Network Authentication eld.
The WEP Key is a 64 bits (5 byte) or 128 bits (13 byte) Hexadecimal digits which is
used to encrypt and decrypt data packets.
Key Format
You can select to enter Hexadecimal digits (0~9, a~f, and A~F) or ASCII characters
to setup keys by dening the Key Format.
ASUS Network adapter 35
Chapter 3 - Software Reference
Chapter 3
Software Reference