User's Manual

The access point places the client port in the authorized state and data
traffic is allowed to proceed.
802.1x Features
802.1x supplicant protocol support
Support for the Extensible Authentication Protocol (EAP) - RFC 2284
Supported Authentication Methods:
EAP TLS Authentication Protocol - RFC 2716 and RFC 2246
EAP Tunneled TLS (TTLS)
PEAP
Supports Microsoft Windows XP and Windows 2000
WPA or WPA2
Wi-Fi Protected Access (WPA or WPA2) is a security enhancement that
strongly increases the level of data protection and access control to a wireless
network. WPA enforces 802.1x authentication and key-exchange and only
works with dynamic encryption keys. To strengthen data encryption, WPA
utilizes Temporal Key Integrity Protocol (TKIP). TKIP provides important data
encryption enhancements that include a per-packet key mixing function, a
message integrity check (MIC) called Michael an extended initialization vector
(IV) with sequencing rules, and a rekeying mechanism. With these
improvement enhancements, TKIP protects against WEP's known weaknesses.
The second generation of WPA that complies with the IEEE TGi specification is
known as WPA2.
Enterprise Mode: Enterprise Mode verifies network users through a RADIUS
or other authentication server. WPA utilizes 128-bit encryption keys and
dynamic session keys to ensure your wireless network's privacy and enterprise
security. Enterprise Mode is targeted to corporate or government
environments.
Personal Mode: Personal Mode requires manual configuration of a pre-shared