User manual
set wlan
242 Chapter 2 Command Descriptions
Authentication methods and associated data fields
The following table shows the authentication methods available for
wireless devices, and the associated data fields, or command options, that
apply to each method. All data fields with that have an X in a particular
authentication method’s column are required, except for trusted
certificates, which is optional.
Data Fields: Authentication Method:
Open Shared
Key
WEP
authentication
WPA-
PSK
WPA
authentication
LEAP
WEP keys X
If WEP
encryption
is selected.
X
Passphrase X
Authentication
methods
XX
Username,
password
XXX
Client
certificate
X
If TLS is
selected.
X
If TLS is
selected.
Trusted
certificates
XX