beautypg.com

INTELLINET NETWORK 525206 Wireless 300N High-Gain USB Adapter User Manual User Manual

Page 19

background image

15

Network Authentication

This setting has to be consistent with the wireless networks that
the adapter intends to connect.

Open System
– No authentication is needed within the wireless
network.

Shared Key – Only wireless stations using a shared key (WEP
Key identified) are allowed to connect to each other.

WPA-PSK – This is a special mode designed for home and small
business users who do not have access to network authentication
servers. In this mode, known as Pre-Shared Key, the user
manually enters the starting password in their access point or
gateway, as well as in each wireless station in the network.
WPA-PSK takes over automatically from that point, keeping
unauthorized users that don’t have the matching password from
joining the network, while encrypting the data traveling between
authorized devices.

WPA2-PSK – WPA2-PSK is also for home and small business.
The difference between WPA-PSK and WPA2-PSK is that
WPA2-PSK provides data encryption via AES. In contrast,
WPA-PSK uses the Temporal Key Integrity Protocol (TKIP).

WPA 802.1X – WPA provides a scheme of mutual authentication
using either IEEE 802.1x / Extensible Authentication Protocol
(EAP) authentication or pre-shared key (PSK) technology. It
provides a high level of assurance to enterprises, small
businesses and home users that data will remain protected and
that only authorized users may access their networks. For
enterprises that have already deployed IEEE 802.1x
authentication, WPA offers the advantage of leveraging existing
authentication databases and infrastructures.

WPA2 802.1X – Like WPA, WPA2 supports IEEE 802.1x / EAP
authentication or PSK technology. It also includes a new
advanced encryption mechanism using the Advanced Encryption
Standard (AES). AES is required for corporate or government
users. The difference between WPA and WPA2 is that
WPA2 provides data encryption via AES. In contrast, WPA uses
the Temporal Key Integrity Protocol (TKIP).

WEP 802.1X – This is a special mode for using IEEE 802.1x /
EAP technology for authentication and WEP keys for data
encryption.