User's Manual

14 ASUS WLAN Adapter
English
Quick Start Guide
Network Authentication
Since there is no precise bound in
wireless LANs, the WLAN users need
to implement certain mechanism
to provide security solution. The
Authentication policies in this tab
provide protection of different levels
such as Open, WEP, WPA, and WPA2.
Open
- Select this option to make the
network operate on Open System
mode, which use no authentication
DOJRULWKP2SHQ VWDWLRQV DQG$3V FDQ DXWKHQWLFDWH ZLWK HDFKRWKHU ZLWKRXW
FKHFNLQJDQ\:(3.H\HYHQLIWKHUHLV
Shared
- Select this option to make the network operate on Shared key mode.
,QD6KDUH.H\$XWKHQWLFDWLRQV\VWHPIRXUVWHSH[FKDQJHRIIUDPHVLVUHTXLUHG
WRYDOLGDWHWKDWWKHVWDWLRQLVXVLQJWKHVDPH:(3.H\DVWKHDFFHVVSRLQW
WPA-PSK/ WPA2-PSK
- Select this option to enable WPA Pre-Shared Key
under Infrastructure mode. It enables communication between your client and
$3VXVLQJ:3$36.:3$36.HQFU\SWLRQPRGH
WPA/ WPA2
7KHQHWZRUNLVRSHUDWLQJLQ,((([DXWKHQWLFDWLRQPRGH
7KLVPRGHLV IRUHQYLURQPHQWVZLWK 5$',865HPRWH$FFHVV'LDOLQ8VHU
Service). In a RADIUS environment, various Extensible Authentication Protocol
($3DUHVXSSRUWHGLQFOXGLQJ3($37/66PDUW&DUG77/6DQG/($3
&RQÀJ(QFU\SWLRQ
7KLVSDJH HQDEOHV\RXWRFRQILJXUHWKH:LUHOHVV/$1$GDSWHUHQFU\SWLRQ
VHWWLQJV )RU GDWD FRQILGHQWLDOLW\LQD ZLUHOHVV HQYLURQPHQW,(((
VSHFLILHVD :LUHG (TXLYDOHQW3ULYDF\ :(3 DOJRULWKPWR RIIHUWUDQVPLVVLRQ
privacy. The WEP uses keys to encrypt and decrypt data packets. The
encryption process can scramble frame bits to avoid disclosure to others. The
:3$:3$ LV LPSURYHG VHFXULW\ V\VWHP IRU  ZKLFK DUH GHYHORSHG WR
overcome the weakness of the WEP protocol.