User Manual
Table Of Contents
- User Guide
- Table of Contents
- List of Figures
- Chapter 1: Introduction
- Chapter 2: Planning your Wireless Network
- Chapter 3: Getting to Know the Wireless-G Notebook Adapter
- Chapter 4: Software Installation and Configuration
- Chapter 5: Hardware Installation
- Chapter 6: Using the WLAN Monitor
- Appendix A: Troubleshooting
- Appendix B: Wireless Security
- Appendix C: Windows Help
- Appendix D: Glossary
- Appendix E: Specifications
- Appendix F: Warranty Information
- Appendix G: Regulatory Information
- Appendix H: Contact Information

22
Chapter 6: Using the WLAN Monitor
Creating a New Profile
Wireless-G Notebook Adapter
WPA RADIUS.
WPA RADIUS features WPA used in coordination with a RADIUS server. (This should only be used when a
RADIUS server is connected to the Router.) WPA Radius offers two encryption methods, TKIP and AES, with
dynamic encryption keys. It offers five authentication methods: EAP-TLS, EAP-TTLS, EAP-MD5, EAP-PEAP,
and LEAP.
Click the Next button to continue and the screen in Figure 6-19 appears. Click the Back button to return to
the previous screen.
Select the type of algorithm, TKIP or AES, for the Encryption Type.
Click the Next button to continue. Click the Back button to return to the previous screen.
Figure 6-19: TKIP Settings
Figure 6-18: WPA RADIUS Settings










