Edimax Technology 802.11g Network Card User Manual


 
This is because the WEP keys of all devices that are to communicate with each
other must match.
Authentication Process
Enabling EAP on the access point and configuring the USB device to LEAP,
EAP-TLS, PEAP (EAP-GTC), or PEAP (EAP-MSCHAP V2) authentication to
the network occurs in the following sequence:
1. The client associates to an access point and begins authentication.
2. Communicating through the access point, the client and RADIUS server
complete authentication with the password (LEAP and PEAP) or
certificate (EAP-TLS). The password is never transmitted during the
process.
3. After successful authentication, the client and RADIUS server derive a
dynamic WEP key unique to the client.
4. The RADIUS server transmits the key to the access point using a secure
channel on the wired LAN.
5. For the length of a session the access point and the client use this key to
encrypt or decrypt all unicast packets (and broadcast packets).
Overview Of the Security Configuration Options In ACU
Radio Button Description
WPA
Enables the use of Wi-Fi Protected Access (WPA).
Choosing WPA opens the WPA EAP drop-down menu. The
options include:
EAP-TLS
EAP-TTLS
PEAP (EAP-GTC)
PEAP (EAP-MSCHAP V2)
LEAP
WPA
Pass phrase
Enables WPA Passphrase security.
Cli ck on the Configure button and fill in the WPA Passphrase.
802.1x
Enables 802.1x security. This option requires IT administration.
Choosing 802.1x opens the 802.1x EAP type drop-down
menu. The options include:
EAP-TLS
EAP-TTLS
PEAP (EAP-GTC)
PEAP (EAP-MSCHAP V2)
LEAP
If the access point that the wireless adapter is associating to has
WEP set to Optional and the client has WEP enabled, make sure
14