Motorola WU830G User Manual

Page 36

Advertising
background image

CONFIGURATION

SECTION 3

WU830G

3-19

The following table lists the fields displayed when WPA
authentication is used:

Field Description

Encryption
Status

TKIP is the encryption algorithm used on the
packets.

EAP Method

There are four different (Extensible Authentication
Protocol) EAP methods that you can select on this
window:

EAP-TLS

This method requires a Login
Name
and Certificate issued by
the RADIUS server to which you
are connecting.

Together, the login name and the
certificate enable the RADIUS
server to authenticate your
identity.

You can also choose to
authenticate the identity of the
RADIUS server by enabling the
Validate Server Certificate
check box.

EAP-TTLS

This method requires a Login
Name
and Password.

You must also choose an
additional TTLS Protocol. The
TTLS protocol must match the
one on your target RADIUS
server. The four TTLS Protocols
are:
PAP
CHAP
MS CHAP
MS CHAP v2

You can also choose to
authenticate the RADIUS server
identity by checking the Validate
Server Certificate
check box.

Advertising