Toshiba Client Solutions CO. LTD. UPP350WL2 User Manual
Security Tab
In the Atheros Client Utility, access the Security tab by clicking New or Modify on the Station
Configuration tab. Click the Security tab.
Edit the fields in the Security tab of the Network Configuration Settings to configure the profile.
Make sure to also edit the General and Advanced tabs.
Field Name
Configuration tab. Click the Security tab.
Edit the fields in the Security tab of the Network Configuration Settings to configure the profile.
Make sure to also edit the General and Advanced tabs.
Field Name
Description
Encryption Type
Specifies the encryption type:
Use Dynamic
Use Dynamic Security
Security
Use dynamic encryption keys, such as
those defined by Cisco LEAP or 802.1X.
To use Cisco LEAP, make sure the
checkbox "Enable Cisco LEAP" is checked,
and fill in the LEAP User Name and
Password.
Use Static Keys
Use Static Keys
Use static encryption keys. Enter the keys
in the Encryption Keys fields.
Disabled
Disabled
Use no encryption.
Enable Cisco LEAP
Enables the use of Cisco LEAP for
dynamic security keys. Click the Use
Dynamic Security radio button under
Encryption Type to use Cisco LEAP.
User Name
The user name used to log in to the
network.
Password
The password used to log in to the
network. This password is encrypted
using the same encryption type as the
encryption keys.
To define static encryption keys, click the Define Static Encryption Keys button with either Dynamic
Security or Static Keys selected. Fill in the security dialog box.
Security or Static Keys selected. Fill in the security dialog box.
Define Static Encryption Keys
To define static encryption keys, click the Define Static Encryption Keys button on the security tab.
Fill in the fields in the Security dialog box.
Field Name
Fill in the fields in the Security dialog box.
Field Name
Description
Key Entry Method
Determines the entry method for an
encryption key: hexadecimal (0-9, A-F), or
ASCII text (all keyboard characters).
Encryption Keys
Selects the default encryption keys used
(either Unique or Shared). Only allows the
selection for a Unique key, or a shared
First, Second, Third, or Fourth key whose
corresponding field has been completed.
Unique Key
Defines the unique encryption key for
network configuration security. This field
must be populated to enable security
using a unique key.
Click on the radio button to set the unique
key as the default encryption key.
Not used in ad hoc mode.
Shared Keys (First, Second, Third Fourth) Defines a set of shared encryption keys for
network configuration security. At least
one Shared Key field must be populated to
enable security using a shared key.
Click on the radio button to set the key as