Motorola WPCI810G User Manual

Page 13

Advertising
background image

Installation

Section 2

WPCI810

2-3

The options supported by the adapter:

Network Authentication

Data Encryption

Option Description

Option

Description

Disabled No

encryption

used.

Open

A network can be set up either to use or not
use a network key for data encryption. WEP
is the type of encryption used. Open WEP is
the first-generation basic level security for
wireless networks.

WEP

A network key
used.

Disabled No

encryption

used.

Shared

The network operates in Shared Key
authentication mode when a network key is
used for data encryption. Data encryption can
be enabled or disabled. WEP is the type of
encryption used. The Shared Key
authentication mode is the least secure.

WEP

A network key
used.

TKIP

A network key
used (more
secure).

WPA

The network operates in IEEE 802.1x
authentication mode. This mode is for
environments with a Remote Access Dial-In
User Service (RADIUS) infrastructure.

This environment requires heavy technical
support to set up and maintain and is used by
large corporations.

In a RADIUS environment, various Extensible
Authentication Protocols (EAPs) are
supported. These may include TLS, TTLS,
PEAP, and LEAP.

AES

A network key
used (most
secure).

TKIP

A network key
used (more
secure).

WPA-
PSK

For infrastructure environments without the
RADIUS infrastructure. WPA-PSK supports
the use of a pre-shared key.
WPA-PSK choice negotiates the security
parameters with associated wireless access
point, either in Wi-Fi

Protected Access (WPA)

or Wi-Fi

Protected Access version 2 (WPA2)

depends on the access point capability. If
access point supports both WPA-PSK and
WPA2-PSK, the wireless adapter will
negotiate for a stronger suite, which is WPA2-
PSK.

AES

A network key
used (most
secure).

Advertising