Operation Manual
horNET Wi-Fi USB Lite (P 6122-07)
12
• AES (Advanced Encryption System) uses symmetrical 128-bit data block
encryption.
WPA Preshared Key: Enter the WPA preshared key (WPA-PSK and WPA2-PSK only).
The key should be 8 to 32 characters in length.
802.1x Setting (WPA and WPA2 only): Click this button to open a dialog box with IEEE
802.1x parameters.
Show Password: Select this box if you do not want password characters to be replaced
with “*”.
•
••
• 802.1x Setting dialog box
Authentication Type: Select the authentication method to be used.
• PEAP: PEAP (Protected Extensible Authentication Protocol) uses tunneling to carry
credentials between PEAP clients and the authentication server. PEAP can
authenticate wireless LAN clients by using server-side certificates only, which
simplifies the implementation and administration of a secure wireless network.
• TLS/Smart Card: Transport Layer Security uses certificates and two-way
client/network authentication. TLS is based on authentication using client-side and
server-side certificates, and can be used to dynamically generate user/session
based WEP keys to secure further communications between a wireless network
client and the access point.
• TTLS: Tunneled Transport Layer Security uses certificates and two-way client and
network authentication, and the data required for authentication are transferred
using an encrypted channel. Unlike EAP-TLS, EAP-TTLS requires only server-side
certificates.
• MD5-Challenge: This EAP authentication method provides basic EAP support. Only
one-way authentication is supported, therefore two-way client and network
authentication is not possible. This method can only be selected if Open or Shared
is selected as Authentication Type in the profile edit dialog.
Session Resumption: Select the session resumption method, i.e. Disabled,
Reauthenticate, Roaming, SameSsid or Always.
Identity: Enter your identity for the server.
Password: Enter your password for the server.
Use Client Certificate: Enable the client certificate for server authentication.
Protocol: Select the tunneling protocol from the list.
Identity: Enter your identity for the tunnel.
Password: Enter your password for the tunnel.










