SEH Computertechnik PS54a-G Network Card User Manual


 
18 Hardware Installation Guide
WPA / WPA2 (Wi-Fi Protected Access)
In contrast to WEP, WPA offers enhanced mechanisms for exchanging keys. The
exchange key is only used at the beginning of a session. Afterwards a session key
is used. The key is regenerated periodically.
The WPA mechanism requires an authentication at the beginning of a
connection. Network authentication is done via the Pre-Shared-Key (PSK), a
password with 8 to 63 alphanumeric characters.
An individual 128-bit key is used for data encryption after the authentication.
The following encryption methods are available to encrypt your data.
- TKIP (Temporal Key Integrity Protocol) for WPA
- AES (Advanced Encryption Standard) for WPA2
EAP
Authentication
By using authentication, you can verify the identity of a device/user before
granting access to network resources. The print server provides different types of
EAP (Extensible Authentication Protocol) for authentication.
- If you are using the 'EAP-MD5’ or ’EAP-LEAP' authentication method, the print
server has to be defined as a user on the RADIUS server. User names and
passwords need to be entered during the installation of the print server.
- If you are using the authentication method 'EAP-TLS', the print server and the
authentication server (RADIUS) need to exchange certificates. A certificate
must be entered during the installation of the print server.
For further information about authentication, see the ’User Manual’.