User's Manual
Table Of Contents
- Use the Intel® PROSet/Wireless WiFi Connection Utility
- Contents
- Use the Intel® PROSet/Wireless WiFi Connection Utility
- Taskbar Icon
- Get Connected
- WiFi Networks List
- Connection Status Icons
- Network Properties
- Network Connection Details
- Intel® Wireless Troubleshooter
- Application Settings (Tools menu)
- Turn Wireless Radio On or Off
- Adapter Settings
- Advanced Statistics (Advanced menu)
- Profile Management
- Profile Wizard General Settings
- Wireless Network Overview
- Security Overview
- Personal Security
- Enterprise Security
- Using the Administrator Tool
- Intel® Wireless Troubleshooter (Tools menu)
- Regulatory Information
- Specifications
- Customer Support
- Warranty Information
- Glossary
● TKIP
● CKIP
Authentication Types
● TLS
● TTLS
● PEAP
● LEAP
● EAP-SIM
● EAP-FAST
● EAP-AKA
Authentication Protocols
● PAP
● CHAP
● MS-CHAP
● MS-CHAP-V2
● GTC
● TLS
Cisco Features
● Cisco LEAP
● Cisco Rogue Access Point Security Feature
● 802.11b and 802.11g Mixed Environment Protection Protocol
● CKIP
● Fast Roaming (CCKM)
● Radio Management
Protecting Your WiFi Network
Your wireless network, if left unprotected, is vulnerable to access from other computers. You
can easily protect your home and small business network from nearly all forms of
unauthorized access with the security methods described in this section.
Authentication
Authentication is the process of identifying and approving a request from a client (usually a