User's Manual
14 ASUS WLAN Adapter
English
Quick Start Guide
Network Authentication
Since there is no precise bound in
wireless LANs, the WLAN users need
to implement certain mechanism
to provide security solution. The
Authentication policies in this tab
provide protection of different levels
such as Open, WEP, WPA, and WPA2.
Open
- Select this option to make the
network operate on Open System
mode, which use no authentication
DOJRULWKP2SHQ VWDWLRQV DQG$3V FDQ DXWKHQWLFDWH ZLWK HDFKRWKHU ZLWKRXW
FKHFNLQJDQ\:(3.H\HYHQLIWKHUHLV
Shared
- Select this option to make the network operate on Shared key mode.
,QD6KDUH.H\$XWKHQWLFDWLRQV\VWHPIRXUVWHSH[FKDQJHRIIUDPHVLVUHTXLUHG
WRYDOLGDWHWKDWWKHVWDWLRQLVXVLQJWKHVDPH:(3.H\DVWKHDFFHVVSRLQW
WPA-PSK/ WPA2-PSK
- Select this option to enable WPA Pre-Shared Key
under Infrastructure mode. It enables communication between your client and
$3VXVLQJ:3$36.:3$36.HQFU\SWLRQPRGH
WPA/ WPA2
7KHQHWZRUNLVRSHUDWLQJLQ,((([DXWKHQWLFDWLRQPRGH
7KLVPRGHLV IRUHQYLURQPHQWVZLWK 5$',865HPRWH$FFHVV'LDOLQ8VHU
Service). In a RADIUS environment, various Extensible Authentication Protocol
($3DUHVXSSRUWHGLQFOXGLQJ3($37/66PDUW&DUG77/6DQG/($3
&RQÀJ(QFU\SWLRQ
7KLVSDJH HQDEOHV\RXWRFRQILJXUHWKH:LUHOHVV/$1$GDSWHUHQFU\SWLRQ
VHWWLQJV )RU GDWD FRQILGHQWLDOLW\LQD ZLUHOHVV HQYLURQPHQW,(((
VSHFLILHVD :LUHG (TXLYDOHQW3ULYDF\ :(3 DOJRULWKPWR RIIHUWUDQVPLVVLRQ
privacy. The WEP uses keys to encrypt and decrypt data packets. The
encryption process can scramble frame bits to avoid disclosure to others. The
:3$:3$ LV LPSURYHG VHFXULW\ V\VWHP IRU ZKLFK DUH GHYHORSHG WR
overcome the weakness of the WEP protocol.