Owner's Manual
60 Dell ControlPoint Connection Manager
• The Authentication Method is
WEP
.
• WEP Shared Key Authentication requires a network key for authentication.
CKIP
CKIP - Open System Authentication does not have an authentication function. It
only identifies a wireless node using its wireless adapter hardware address.
• The Data Encryption Method is
CKIP
.
• The Authentication Method is
CKIP
.
• A network key for authentication is required.
WPA/WPA2 - Personal Authentication
For infrastructure environments without the RADIUS infrastructure, WPA-
Personal (PSK) supports the use of a pre-shared key. WPA-Personal (PSK) is the
next generation of wireless network security for home and small office
environments. WPA-Personal (PSK) authentication uses either WPA-PSK or
WPA2-PSK security protocols based on the WPA-PSK/WPA2-PSK security
protocols available on the AP.
• The Data Encryption Method is
Auto (TKIP or AES)
.
• The Authentication Method is
WPA-Personal (PSK)
.
• WPA-Personal Authentication requires a network key for authentication.
802.1X Authentication
802.1X security enforces authentication of a network node before it can begin to
exchange data with the network. This mode is for environments with a Remote
Access Dial-In User Service (RADIUS) infrastructure.
This environment requires advanced technical support to set up and maintain
and is intended for use by larger enterprises.
• The Data Encryption Method is WEP or CKIP.
• The Authentication Method may be one of the following Extensible
Authentication Protocol (EAP)* methods:
–
TLS
—TLS EAP authentication with no inner authentication. Requires a
client certificate.
A5_bk0.book Page 60 Wednesday, January 28, 2009 12:42 PM