Filemate wireless-n pci adapter – Wintec PCI Wireless-N User Manual
Page 19
![background image](/manuals/576244/19/background.png)
FileMate Wireless-N PCI Adapter
(4) Wireless Network Security
A. Network Authentication
There are 7 types supported: Open System, Shared Key, WPA-PSK, WPA2-PSK, and WPA 802.1X,
WPA2 802.1X, WEP 802.1X. Please select a type from the drop down list.
z
Open System: enables the adapter to attempt authentication regardless of its WEP settings. It
will only associate with the access point if the WEP keys on both the adapter and the access
point match.
z
Shared-key: only allows the adapter to associate with access points that have the same WEP
key.
z
802.1x: This item appears while the environment is set to an open authentication with WEP
encryption. The section is also available in WPA and WPA2 authentication types.
z
Preshared Key (PSK): This is the shared key between AP and STA. For WPA-PSK,
WPA2-PSK and WPA-NONE authentication mode, this field must be between 8-32 character
digits. The following dialog appears if you have input invalid values.
z
WEP Key: Only available when using WEP encryption algorithm. The key must match AP's
key. Only using the same cryptographic key to access the computer, the internet can store,
and decryption the information from other computer.
B. Data Encryption:
Data encryption
There are 4 types supported: Disabled, WEP, TKIP and AES. The available
encryption selection will differ from the authentication type you have
chosen, the result is shown below:
Authentication
Available Encryption Selection
Open System
Disabled, WEP
Shared Key , WEP 802.1X
WEP
WPA-PSK, WPA2-PSK, and WPA TKIP, AES
802.1X, WPA2 802.1X, WPA CCKM,
WPA2 CCKM
Note:
Select different Security Options, the configurations are different; you can select the
appropriate security option and configure the exact key as your need.
z
TKIP:
"Temporary Key Integration communication Protocol", it provide each packet's key
mixture, message integration and key reconstruction mechanism. TKIP can use with personal
or the enterprise network validation.
z
AES: “Advanced Encryption St
andard”, it is a new method of privacy protection of wireless
transmission. AES encryption methods are more advanced than TKIP.
(5) Finish the configuration, then click “OK”. The network will now be added to the profile.
- 19 -