SEH Computertechnik SEH InterCon PS54-G User Manual

Page 18

Advertising
background image

18 Hardware Installation Guide

WPA / WPA2 (Wi-Fi Protected Access)

In contrast to WEP, WPA offers enhanced mechanisms for exchanging keys. The
exchange key is only used at the beginning of a session. Afterwards a session key
is used. The key is regenerated periodically.

The WPA mechanism requires an authentication at the beginning of a
connection. Network authentication is done via the Pre-Shared-Key (PSK), a
password with 8 to 63 alphanumeric characters.

An individual 128-bit key is used for data encryption after the authentication.
The following encryption methods are available to encrypt your data.

- TKIP (Temporal Key Integrity Protocol) for WPA

- AES (Advanced Encryption Standard) for WPA2

EAP Authentication

By using authentication, you can verify the identity of a device/user before
granting access to network resources. The print server provides different types of
EAP (Extensible Authentication Protocol) for authentication.

- If you are using the 'EAP-MD5’ or ’EAP-LEAP' authentication method, the print

server has to be defined as a user on the RADIUS server. User names and
passwords need to be entered during the installation of the print server.

- If you are using the authentication method 'EAP-TLS', the print server and the

authentication server (RADIUS) need to exchange certificates. A certificate
must be entered during the installation of the print server.

For further information about authentication, see the ’User Manual’.

Advertising