Figure 3-4.
Security
Description of items in
Figure 3-3
is as follows:
Authentication Mode:
Users can select from a range of different security modes. (Default:
Open System).
Encryption Method:
Select from the drop down box the desired encryption method.
Shared Key - This is when both the sender and recipient share a secret key.
Auto Switch -
WPA-PSK - A user sets a static key or "Passphrase" as with WEP. But WPA-PSK
automatically changes the keys at a preset time interval, making it much more
difficult for hackers to find and exploit them.
WPA (802.1x EAP/TLS) & WPA (802.1x PEAP) - authentication processes derive
mutually-determined unicast encryption keys. EAP-TLS or PEAP authentication
provides secure wireless networking in a Windows environment.
WPA (EAP/LEAP) – Similar to PEAP, it is a proprietary protocol which was
developed by Cisco.
CCX (EAP/LEAP) – Another Cisco proprietary standard, using Cisco extensions
similar to WPA.
WEP Key Setting
When enabling WEP type encryption, up to 4 WEP Keys may be configured. Click
11