Edimax Technology EW-7722UTn User Manual

Page 32

Advertising
background image

27

computers within the network.

Key Length

When you select the

“WEP and “PASSPHRASE“ and

this function will display in the current status of the
utility.

The keys are used to encrypt data transmitted in the
wireless network. Fill the text box by following the rules
below.
64-bit

– Input 10-digit Hex values as the encryption

keys. For example:

“0123456aef“.


128-bit

– Input 26-digit Hex values as the encryption

keys. For example:

“01234567890123456789abcdef“.

Key Index (advanced)

Select one of the four keys to be the data encryption
key.

Network Key

Please enter network security key here to make sure
the password is correct.

Parameter

Description

Confirm Network Key

Please enter network security key here again.

EAP Type

GTC

– GTC is an authentication protocol which allows

the exchange of clear text authentication credentials
across the network.

TLS

– TLS is the most secure of the EAP protocols but

not easy to use. It requires that digital certificates be
exchanged in the authentication phase. The server
presents a certificate to the client. After validating the
server‟s certificate, the client presents a client
certificate to the server for validation.

LEAP

– LEAP is a pre-EAP, Cisco-proprietary protocol,

with many of the features of EAP protocols. Cisco
controls the ability of other vendors to implement this
protocol, so it should be selected for use only when
limited vendor choice for client, access-point, and
server products is not a concern. When you have set
up LEAP authentication, you have to enter the user
name and password of your computer.

PEAP & TTLS

– PEAP and TTLS are similar and

easier than TLS in that they specify a stand-alone
authentication protocol be used within an encrypted
tunnel. TTLS supports any protocol within its tunnel,

Advertising