Motorola WU830G User Manual
Page 15

INSTALLATION
SECTION 2
WU830G
2-3
The following table lists the network authentication options and the
data encryption options available for each type of authentication:
Network Authentication
Data Encryption
Option Description
Option Description
Open
With open authentication there is no
data encryption.
Disabled No
encryption is
used.
Shared
The network operates in Shared
Key authentication mode when a
network key is used for data
encryption. WEP is the type of
encryption used. The Shared Key
authentication mode is the least
secure.
WEP 64-bit
or
WEP 128-bit
A network
key is used.
WPA-PSK
For infrastructure environments
without the RADIUS infrastructure.
WPA-PSK supports the use of a
pre-shared key. WPA-PSK is the
next generation of wireless network
security for home and small office
environments.
TKIP A
network
key is used
(more
secure).
WPA
The network operates in IEEE
802.1x authentication mode. This
mode is for environments with a
Remote Access Dial-In User Service
(RADIUS) infrastructure.
This authentication is usually used
by enterprise business systems or
large corporations.
In a RADIUS environment, various
Extensible Authentication Protocols
(EAPs) are supported. These may
include TLS, TTLS, PEAP, and
LEAP.
TKIP with
four EAP
methods:
TLS
TTLS
PEAP
LEAP
A network
key is used
(more
secure).