
Table 3-5 Authentication: WPA/ WPA-PSK/ WPA2/ WPA-PSK
LABEL DESCRIPTION
Authentication Type
Select WPA, WPA-PSK, WPA2 or WPA-PSK
Encryption Specify an encryption method to use.
Select TKIP (Temporal Key Integrity Protocol) that uses a stronger
encryption algorithm and protects against hackers with MIC (Message
Integrity Check).
Select AES (Advanced Encryption System) that uses symmetric 128-bit
block data encryption.
WPA-PSK Enter WPA Preshared Key, only valid for WPA-PSK and WPA2-PSK.
This key should be between 8 and 32 characters in length.
802.1x setting Only valid for WPA and WPA2.
Show Password When you check this function, the password will not be covered by *
symbol.
(C) Add Profile: 802.1x
IEEE 802.1x supports true authentication and user control.
Figure 3-10 Add Profile: Authentication and Security: 802.1x Setting: Certification
25
Comentarios a estos manuales