Wireless 11n 1T2R PCI Card
(4) Wireless Network Security
A. Network Authentication
There are 7 types supported: Open System, Shared Key, WPA-PSK, WPA2-PSK, and WPA 802.1X,
WPA2 802.1X, WEP 802.1X. Please select a type from the drop down list.
Open System:
enable an adapter to attempt authentication regardless of its WEP settings. It
will only associate with the access point if the WEP keys on both the adapter and the access
point match.
Shared-key:
only allows the adapter to associate with access points that have the same WEP
key.
802.1x:
This item appears while the environment is set to an open authentication with WEP
encryption. The section is also available in WPA and WPA2 authentication types.
Preshared Key (PSK):
This is the shared secret between AP and STA. For WPA-PSK,
WPA2-PSK and WPA-NONE authentication mode, this field must be filled with characters
longer than 8 and less than 32 lengths.
WEP Key:
Only available when using WEP encryption algorithm. The key must match AP's
key. Only using the same cryptographic key to access the computer, the internet can storage,
and decryption the information from other computer.
B. Data Encryption:
Data encryption
There are 4 types supported: Disabled, WEP, TKIP and AES. The available
encryption selection will differ from the authentication type you have
chosen, the result is shown below:
Authentication
Available Encryption Selection
Open System
Disabled, WEP
Shared Key , WEP 802.1X
WEP
WPA-PSK, WPA2-PSK, and WPA TKIP, AES
802.1X, WPA2 802.1X, WPA CCKM,
WPA2 CCKM
Note:
Select different Security Options, the configurations are different; you can select the
appropriate security option and configure the exact key as your need.
TKIP:
"Temporary Key Integration communication Protocol", it provide each packet's key
mixture, message integration and key reconstruction mechanism. TKIP can use with personal
or the enterprise network validation.
AES:
“Advanced Encryption St
andard”, it is a new method that the wireless transmission of
privacy protection. AES encryption methods provides more careful than TKIP.
(5) Finish the configuration, then click “OK”, that network has been added to the profile.
- 19 -