Teletronics EZ Bridge 802.11G User Manual
Page 45

45
protocol (TKIP). TKIP scrambles the keys using a hashing
algorithm and, by adding an integrity-checking feature, ensures that
the keys haven’t been tampered with.
•
User authentication, which is generally missing in WEP, through the
extensible authentication protocol (EAP). WEP regulates access to
a wireless network based on a computer’s hardware-specific MAC
address, which is relatively simple to be sniffed out and stolen.
EAP is built on a more secure public-key encryption system to
ensure that only authorized network users can access the network.
WPA enabled
To enable the WPA Authenticator
PSK pass-phrase
PSK stands for Pre-Shared-Key and serves as a password. User may key
in a 8 to 63 characters string to set the password or leave it blank, in which
the 802.1x Authentication will be activated. Note that if user key in own
password, make sure to use the same password on client's end.
WPA Multicast Cipher Type
Select TKIP - WPA Default
WPA Pairwise Cipher Type
Select TKIP - WPA Default
WPA Group Key Update Interval
This shows the time period for the next key change. The default value is
3600 (seconds). Users may set the values of their preference.
802.1X configuration
Remote RADIUS server configuration settings