horNET Wi-Fi USB Lite (P 6122-07)
12
•
AES
(Advanced Encryption System) uses symmetrical 128-bit data block
encryption.
WPA Preshared Key
: Enter the WPA preshared key (WPA-PSK and WPA2-PSK only).
The key should be 8 to 32 characters in length.
802.1x Setting
(WPA and WPA2 only): Click this button to open a dialog box with IEEE
802.1x parameters.
Show Password
: Select this box if you do not want password characters to be replaced
with “*”.
•
••
•
802.1x Setting dialog box
Authentication Type
: Select the authentication method to be used.
•
PEAP
: PEAP (Protected Extensible Authentication Protocol) uses tunneling to carry
credentials between PEAP clients and the authentication server. PEAP can
authenticate wireless LAN clients by using server-side certificates only, which
simplifies the implementation and administration of a secure wireless network.
•
TLS/Smart Card
: Transport Layer Security uses certificates and two-way
client/network authentication. TLS is based on authentication using client-side and
server-side certificates, and can be used to dynamically generate user/session
based WEP keys to secure further communications between a wireless network
client and the access point.
•
TTLS
: Tunneled Transport Layer Security uses certificates and two-way client and
network authentication, and the data required for authentication are transferred
using an encrypted channel. Unlike EAP-TLS, EAP-TTLS requires only server-side
certificates.
•
MD5-Challenge
: This EAP authentication method provides basic EAP support. Only
one-way authentication is supported, therefore two-way client and network
authentication is not possible. This method can only be selected if
Open
or
Shared
is selected as
Authentication Type
in the profile edit dialog.
Session Resumption
: Select the session resumption method, i.e.
Disabled
,
Reauthenticate
,
Roaming
,
SameSsid
or
Always
.
Identity
: Enter your identity for the server.
Password
: Enter your password for the server.
Use Client Certificate
: Enable the client certificate for server authentication.
Protocol
: Select the tunneling protocol from the list.
Identity
: Enter your identity for the tunnel.
Password
: Enter your password for the tunnel.