Reference Guide
reference guide
use the network configuration tools
81
network config tools
Authentication Type Type of authentication in use:
• Open System (ad-hoc and infrastructure): no authentication.
• Shared Key (infrastructure only): WEP key is required.
•LEAP (infrastructure only): EAP server authentication is required.
•PEAP (infrastructure only): EAP server authentication is required.
•EAP-TLS (infrastructure only): EAP server authentication is required.
•EAP-MD5 (infrastructure only): EAP server authentication is required.
•EAP-TTLS (infrastructure only): EAP server authentication is required.
• EAP-PSK (infrastructure only): EAP with Pre-Shared Key (WPA/PSK).
Authentication verifies the identity of a user or device before granting
access to the network, making it more difficult for unauthorized users to
get at network resources. This security method is common on wireless
networks.
A network using Open System authentication does not screen network
users based on their identities. Any wireless user can have access from
the network. However, such a network might use WEP (Wired Equivalent
Privacy) encryption to provide a first level of security against casual
eavesdroppers.
A network using Shared Key authentication provides increased security
by requiring users or devices to identify themselves with a static key (a
hexidecimal or alphanumeric string). This key is shared by all users of the
network -- that is, every user or device uses the same key. WEP encryption
is used along with shared key authentication, using the same key for both
authentication and encryption.
A network using server-based (EAP/802.1x) authentication provides
significantly stronger security, and is commonly used in enterprise-level
networks. A dedicated server resides on the network and verifies the
identity of a user or device requesting access to the network before
granting that access. Several different authentication protocols might be
used on an authentication server.
Note: Shared key and EAP/802.1x authentication can only be
entered through the EWS.
Encryption The type of encryption in use on the network:
•None: no encryption is in use.
•64-bit WEP: a 5-character or 10-hex-digit WEP key is in use.
•128-bit WEP: a 13-character or 26-hex-digit WEP key is in use.
•Dynamic: dynamic encryption is being used with WEP, TKIP, or
both.
WEP aims to provide security by encrypting data over radio waves so
that it is protected as it is transmitted from one end point to another. This
security method is common on wireless networks.
field description