beautypg.com

Teletronics EZ Bridge 802.11G User Manual

Page 45

background image

45

protocol (TKIP). TKIP scrambles the keys using a hashing
algorithm and, by adding an integrity-checking feature, ensures that
the keys haven’t been tampered with.

User authentication, which is generally missing in WEP, through the
extensible authentication protocol (EAP). WEP regulates access to
a wireless network based on a computer’s hardware-specific MAC
address, which is relatively simple to be sniffed out and stolen.
EAP is built on a more secure public-key encryption system to
ensure that only authorized network users can access the network.

WPA enabled

To enable the WPA Authenticator

PSK pass-phrase

PSK stands for Pre-Shared-Key and serves as a password. User may key
in a 8 to 63 characters string to set the password or leave it blank, in which
the 802.1x Authentication will be activated. Note that if user key in own
password, make sure to use the same password on client's end.

WPA Multicast Cipher Type

Select TKIP - WPA Default

WPA Pairwise Cipher Type

Select TKIP - WPA Default

WPA Group Key Update Interval

This shows the time period for the next key change. The default value is
3600 (seconds). Users may set the values of their preference.

802.1X configuration

Remote RADIUS server configuration settings