Motorola WU830G User Manual
Page 36
CONFIGURATION
SECTION 3
WU830G
3-19
The following table lists the fields displayed when WPA
authentication is used:
Field Description
Encryption
Status
TKIP is the encryption algorithm used on the
packets.
EAP Method
There are four different (Extensible Authentication
Protocol) EAP methods that you can select on this
window:
EAP-TLS
This method requires a Login
Name and Certificate issued by
the RADIUS server to which you
are connecting.
Together, the login name and the
certificate enable the RADIUS
server to authenticate your
identity.
You can also choose to
authenticate the identity of the
RADIUS server by enabling the
Validate Server Certificate
check box.
EAP-TTLS
This method requires a Login
Name and Password.
You must also choose an
additional TTLS Protocol. The
TTLS protocol must match the
one on your target RADIUS
server. The four TTLS Protocols
are:
PAP
CHAP
MS CHAP
MS CHAP v2
You can also choose to
authenticate the RADIUS server
identity by checking the Validate
Server Certificate check box.