beautypg.com

Motorola WU830G User Manual

Page 15

background image

INSTALLATION

SECTION 2

WU830G

2-3

The following table lists the network authentication options and the
data encryption options available for each type of authentication:

Network Authentication

Data Encryption

Option Description

Option Description

Open

With open authentication there is no
data encryption.

Disabled No

encryption is
used.

Shared

The network operates in Shared
Key authentication mode when a
network key is used for data
encryption. WEP is the type of
encryption used. The Shared Key
authentication mode is the least
secure.

WEP 64-bit
or
WEP 128-bit

A network
key is used.

WPA-PSK

For infrastructure environments
without the RADIUS infrastructure.
WPA-PSK supports the use of a
pre-shared key. WPA-PSK is the
next generation of wireless network
security for home and small office
environments.

TKIP A

network

key is used
(more
secure).

WPA

The network operates in IEEE
802.1x authentication mode. This
mode is for environments with a
Remote Access Dial-In User Service
(RADIUS) infrastructure.

This authentication is usually used
by enterprise business systems or
large corporations.

In a RADIUS environment, various
Extensible Authentication Protocols
(EAPs) are supported. These may
include TLS, TTLS, PEAP, and
LEAP.

TKIP with
four EAP
methods:

TLS

TTLS

PEAP

LEAP

A network
key is used
(more
secure).