Intellinet Network Solutions 525336 Network Card User Manual


 
15
ASCII
The WEP key can be in ASCII format (alphanumeric values or
signs are allowed) so it’s more recognizable for users.
PASSPHRASE
This is a text string with a maximum of 32 alphanumeric
characters; for example, “Test.” The WEP key is based on the
passphrase determined by you. This passphrase may not work
with other vendors’ products due to possible incompatibility with
other vendors’ passphrase generators, so you must use the same
passphrase or WEP key settings for all wireless computers within
the network.
Key Length
When you select “WEP and “PASSPHRASE,“ this function will
display in the current status of the utility. The keys are used to
encrypt data transmitted in the wireless network. Fill the text box
by following the rules below.
64-bit Input 10-digit hex values as the encryption keys. For
example: “0123456aef.“
128-bit Input 26-digit hex values as the encryption keys. For
example: “01234567890123456789abcdef.“
Key Index (advanced)
Select one of the four keys to be the data encryption key.
Network Key
Enter the network security key ensure the password is correct.
Confirm Network Key
Enter the network security key again.
EAP Type
GTC – GTC is an authentication protocol that allows the exchange
of clear text authentication credentials across the network.
TLS TLS is the most secure of the EAP protocols, but is not
easy to use. It requires that digital certificates be exchanged in the
authentication phase. The server presents a certificate to the
client. After validating the server’s certificate, the client presents a
client certificate to the server for validation.
LEAP LEAP is a pre-EAP, Cisco-proprietary protocol with many
of the features of EAP protocols. Cisco controls the ability of other
vendors to implement this protocol, so it should be selected for
use only when limited vendor choice for client, access-point and
server products is not a concern. When you have set up LEAP
authentication, you need to enter the user name and password of
your computer.
PEAP & TTLS PEAP and TTLS are similar and easier than TLS
in that they specify that a stand-alone authentication protocol be
used within an encrypted tunnel. TTLS supports any protocol
within its tunnel, including CHAP, MSCHAP, MSCHAPv2 and
PAP. PEAP specifies that an EAP-compliant authentication
protocol must be used; this adapter supports MD5, TLS, GTC
(Generic Token Card) and MSCHAPv2.
Tunnel
Includes MD5, GTC, TLS, MSCHAP-v2.
Username
The certificate username in the RADIUS server.
Identity
User’s identity in the RADIUS server.