User`s manual
WE-2100T Series User’s Manual Web Console: Network Settings
7-18
Security Settings for WPA, WPA2
When WPA or WPA2 is used for authentication, you will also need to configure EAP method in
the Security settings for the WLAN profile. Other settings will also be displayed depending on
how EAP method is configured.
There are two parts to WPA and WPA2 security, authentication and data encryption.
z Authentication occurs before access is granted to a WLAN. Wireless clients such as the
WE-2100T are first authenticated by the AP according to the authentication protocol used by
the RADIUS server. Depending on the WLAN security settings, an EAP tunnel can be used to
scramble the username and password that is submitted for authentication purposes.
z Encryption occurs after WLAN access has been granted. For all wireless devices, data is first
encrypted before wireless transmission, using mutually agreed-upon encryption protocols.