523570
12
Zoom out
Zoom in
Previous page
1/24
Next page
horNET Wi-Fi USB 9dBi (P 6122-20)
12
Authentication: WPA PSK and WPA2 PSK
Authentication – Change authentication method.
Encryption – Select the encryption method to be used.
AES (Advanced Encryption System) uses symmetrical 128-bit data block
encryption.
TKIP (Temporal Key Integrity Protocol) uses stronger encryption algorithms and
MIC (Message Integrity Check) to provide security against hackers.
WPA Preshared Key – Enter the WPA preshared key (WPA-PSK and WPA2-PSK only).
The key should be 8 to 32 characters in length.
Show Password – Select this box if you do not want key characters to be replaced with
asterisks.
OK – Closes profile configuration and saves settings.
Cancel – Closes profile configuration without saving settings.
Profile configuration – 8021X Tab
Settings on this Tab allow configuring IEEE 802.1x protocol. All information can be obtained
from wireless network administrator. Appearance of this Tab depends on options selected
from EAP Method and Tunnel Authentication lists.
PEAP – Protect Extensible Authentication Protocol. PEAP transport securely
authentication data by using tunneling between PEAP clients and an authentication
server. PEAP can authenticate wireless LAN clients using only server-side certificates,
thus simplifying the implementation and administration of a secure wireless LAN.
TLS/Smart Card – Transport Layer Security. Provides for certificate-based and mutual
authentication of the client and the network. It relies on client-side and server-side
certificates to perform authentication and can be used to dynamically generate user-
based and session-based WEP keys to secure subsequent communications between the
WLAN client and the access point.
TTLS – Tunneled Transport Layer Security. This security method provides for certificate-
based, mutual authentication of the client and network through an encrypted channel.
Unlike EAP-TLS, EAP-TTLS requires only server-side certificates.
EAP-FAST – Flexible Authentication via Secure Tunneling. It was developed by Cisco.
Instead of using a certificate, mutual authentication is achieved by means of a PAC
(Protected Access Credential) which can be managed dynamically by the authentication
server. The PAC can be provisioned (distributed one time) to the client either manually or
automatically. Manual provisioning is delivery to the client via disk or a secured network
distribution method. Automatic provisioning is an in-band, over the air, distribution. For
tunnel authentication, only support "Generic Token Card" authentication now.
MD5-Challenge – Message Digest Challenge. Challenge is an EAP authentication type
that provides base-level EAP support. It provides for only one-way authentication - there
is no mutual authentication of wireless client and the network.
12


Need help? Post your question in this forum.

Forumrules


Report abuse

Libble takes abuse of its services very seriously. We're committed to dealing with such abuse according to the laws in your country of residence. When you submit a report, we'll investigate it and take the appropriate action. We'll get back to you only if we require additional details or have more information to share.

Product:

For example, Anti-Semitic content, racist content, or material that could result in a violent physical act.

For example, a credit card number, a personal identification number, or an unlisted home address. Note that email addresses and full names are not considered private information.

Forumrules

To achieve meaningful questions, we apply the following rules:

Register

Register getting emails for PENTAGRAM P 6122-20 at:


You will receive an email to register for one or both of the options.


Get your user manual by e-mail

Enter your email address to receive the manual of PENTAGRAM P 6122-20 in the language / languages: English as an attachment in your email.

The manual is 0,59 mb in size.

 

You will receive the manual in your email within minutes. If you have not received an email, then probably have entered the wrong email address or your mailbox is too full. In addition, it may be that your ISP may have a maximum size for emails to receive.

The manual is sent by email. Check your email

If you have not received an email with the manual within fifteen minutes, it may be that you have a entered a wrong email address or that your ISP has set a maximum size to receive email that is smaller than the size of the manual.

The email address you have provided is not correct.

Please check the email address and correct it.

Your question is posted on this page

Would you like to receive an email when new answers and questions are posted? Please enter your email address.



Info