GIGA-BYTE TECHNOLOGY CO. LTD. GN-WPMG Manual De Usuario

Descargar
Página de 27
 
Figure 3-4.   Security 
 
 
Description of items in Figure 3-3 is as follows: 
 
Authentication Mode:
 Users can select from a range of different security modes. (Default: 
Open System). 
 
Encryption Method: Select from the drop down box the desired encryption method. 
 
Shared Key - This is when both the sender and recipient share a secret key. 
 
Auto Switch - 
 
WPA-PSK - A user sets a static key or "Passphrase" as with WEP. But WPA-PSK 
automatically changes the keys at a preset time interval, making it much more 
difficult for hackers to find and exploit them. 
 
WPA (802.1x EAP/TLS) & WPA (802.1x PEAP) - authentication processes derive 
mutually-determined unicast encryption keys. EAP-TLS or PEAP authentication   
provides secure wireless networking in a Windows environment. 
 
WPA (EAP/LEAP) – Similar to PEAP, it is a proprietary protocol which was 
developed by Cisco. 
 
CCX (EAP/LEAP) – Another Cisco proprietary standard, using Cisco extensions 
similar to WPA. 
 
 
WEP Key Setting 
 
When enabling WEP type encryption, up to 4 WEP Keys may be configured.    Click 
11