beautypg.com

Config - encryption, Chapter 3 - software reference – Asus WL-130N User Manual

Page 19

background image

ASUS WLAN Adapter

19

Chapter 3 - Software Reference

Chapter 3

So

ftw

ar

e

Re

fe

re

nc

e

Network Authentication

Since there is no precise bound in

wireless LANs, the WLAN users need

to implement certain mechanism

to provide security solution. The

Authentication policies in this tab

provide protection of different levels

such as Open, Shared, WPA-Personal,

WPA2-Personal, WPA-Enterprise, and

WPA2-Enterprise.
Open - Select this option to make

the network operate on Open System mode, which use no authentication

algorithm. Open stations and APs can authenticate with each other without

checking any WEP Key, even if there is.
Shared - Select this option to make the network operate on Shared key mode.

In a Share Key Authentication system, four-step exchange of frames is required

to validate that the station is using the same WEP Key as the access point.
WPA-Personal/ WPA2-Personal - Select this option to enable WPA Pre-

Shared Key under Infrastructure mode. It enables communication between

your client and APs using WPA-Personal/WPA2-Personal encryption mode.
WPA-Enerprise/ WPA2-Enterprise - The network is operating in IEEE 802.1x

authentication mode. This mode is for environments with RADIUS (Remote

Access Dial-in User Service). In a RADIUS environment, three Extensible

Authentication Protocol (EAP) are supported, including PEAP, EPA/TLS, and

LEAP.

Config - Encryption

This page enables you to configure the Wireless LAN Adapter encryption

settings. For data confidentiality in a wireless environment, IEEE 802.11

specifies a Wired Equivalent Privacy (WEP) algorithm to offer transmission

privacy. The WEP uses keys to encrypt and decrypt data packets. The

encryption process can scramble frame bits to avoid disclosure to others. The

WPA/WPA2 is improved security system for 802.11 which are developed to

overcome the weakness of the WEP protocol.