User's Manual
while WPA-PSK is more secure without the need for a dedicated authentication server.
WPA
On the WPA settings pane, the user selects the method of authentication used when
the device communicates with a RADIUS server. RADIUS servers are typically used in a
corporate environment.
> The method of authentication is selected from the “Main Protocol” pop-up menu.
The following bullets describe in more detail additional parameters that might
be necessary for the different methods:
- EAP/LEAP This protocol does not use any additional parameters.
-
EAP/PEAP This protocol uses certificates for authentication. By setting the appropriate
check box, the user may request a verification of the server’s certificate.
-
EAP/SIM This protocol does not use any additional parameters.The user’s SIM
must be present when he wants to attach to a WLAN network. Usually
the user enters the SIM-PIN when the main application is started.
If the user did not enter the SIM-PIN when the main application started,
the main application prompts the user for the SIM-PIN using the usual
dialog for entering a SIM. The main application can simply check whether
the SIM-PIN is needed when the user tries to open a connection with
EAP/SIM as its authentication method and prompt the users as appropriate.
- EAP/TokenCard This protocol does not need any additional parameters.
- EAP/TLS This protocol uses certificates for authentication. The user must select
a personal certificate for this method to work. If there is no certificate selected,
this triggers a warning. The only additional parameter for this method is
whether the server’s certificate should be verified.
- EAP/TLS This protocol uses a certificate for authentication.
All connections can be started from the GlobeTrotter MM controller icon in the taskbar.
getting started
27
Open
Open authentication lets users attach to networks quickly as there is no access
control and encryption may be turned off. The amount of configuration is therefore
minimal. This mode is ideal for an ad-hoc network created for instance during a
meeting to exchange data or collaborate on a document. If encryption is set to
“None”, the files for entering WEP keys are hidden.
Shared
Shared authentication using WEP encryption provides weak security. If this method
has been selected, the user can either enter four shared keys. You can choose if you
want a 40(64) bit [equivalent to 10 hexadecimal or 5 ASCII characters] or 104 (128)
bit [equivalent to 26 hexadecimal or 13 ASCII characters] WEP key.
> The user can enter up to four different WEP keys. All entered keys must be of
the same length or the configuration is invalid. If the configuration is invalid,
the triggers a warning.
> The user can enter a key either as a sequence of hexadecimal digits or as a string
of characters as defined by the format buttons above the key fields.
> As long as the user enters a key and the key’s length is not correct, an appropriate
warning is shown.
WPA-PSK
If the user selects authentication via WPA-PSK, he has to enter a so-called
pre-shared key. Such keys contain between 8 and 63 characters. The user may
enter these characters in an appropriate password field. The text of the key is
shown masked unless the check box “Clear text” is turned on.
Note WPA-PSK is a stronger encryption method than WEP, users are advised to use
WPA-PSK whenever possible. The amount of configuration is essentially the same
getting started
26