User's Manual
A WAN client initiates an authorization request to the access point, which authenticates the client
to an Extensible Authentication Protocol (EAP) compliant RADIUS server. This RADIUS server
may authenticate either the user (via passwords) or the machine (by MAC address).
IPSEC
Software based IPSEC transport security.
TKIP (Temporal key Integrity Protocol)
Uses an encryption method called fast-packet rekeying, that changes the encryption keys
frequency.
Virtual Private Networks (VPN)
The following VPN client software is supported by PROSet. Refer to Virtual Private Network
(VPN) for more information.
• Netstructure VPN (SST)
• Netstructure VPN (IPsec-IKE)
• Cisco 3000 VPN
• Checkpoint VPN (Non office transparent mode, connect office mode and connect non-
office mode)
• Microsoftt VPN (L2TP over IPsec transport, L2TP for configuration with ESP-in-UDP)
802.11a and 802.11b can be augmented with VPN security to protect TCP/IP based services.
Back to Contents
Copyright© 2002 Intel Corporation.
Back to Contents
Setting Up WEP Encryption and Authentication
Wired Equivalent Privacy (WEP) encryption and shared authentication provides protect for your
data on the network. WEP uses an encryption key to encrypt data before transmitting it. Only
computers using the same encryption key can access the network or decrypt the encrypted data
transmitted by other computers. Authentication provides an additional validation process from the
adapter to the access point.
Note: You must use the same encryption type, key index number, and WEP key as other devices
on your wireless network. Also, if 802.1x authentication is being used, WEP encryption must be
disabled.
To enable 64-bit (40-bit) or 128-bit encryption with authentication:
1. Select the wireless adapter in the left-side pane.