Digi ConnectPort X4 User's Guide Page 57

  • Download
  • Add to my manuals
  • Print
  • Page
    / 271
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 56
Configuration through the web interface
57
WiFi security settings
The WiFi security settings specify the wireless security settings that the wireless network uses.
Multiple security and authentication modes may be chosen depending on the configuration of the
access point or wireless network. The wireless device will automatically select and determine the
authentication and encryption methods to use while associating to the wireless network. If the
wireless network does not use security and uses an Open Network architecture, these settings do
not need to be modified.
Note that WPA settings require that the device communicate to Access Points and is not valid
when the Connection Method is set to Connect to wireless systems using peer-to-peer
(ad-hoc). Also, WPA pre-shared key (WPA-PSK) security is only valid when a specific
Network Name or SSID is being used.
Network Authentication: The authentication method or methods used for wireless
communications.
Use any available authentication method: Enables all of the methods. The
actual method used will be determined by the capabilities of the wireless network.
Use the following selected method(s): Selects one or more authentication
methods for wireless communications.
Open System: IEEE 802.11 open system authentication is used to establish a
connection.
Shared Key: IEEE 802.11 shared key authentication is used to establish a
connection. At least one WEP key must be specified in order to use shared key
authentication.
WEP with 802.1x authentication: IEEE 802.1x authentication (EAP) is used to
establish a connection with an authentication server or access point. Wired
Equivalent Privacy (WEP) keys are dynamically generated to encrypt data over the
wireless network.
WPA with pre-shared key (WPA-PSK): The Wi-Fi Protected Access (WPA)
protocol is used with a pre-shared key (PSK). The PSK is calculated using a
passphrase and the network SSID.
WPA with 802.1x authentication: The WPA protocol and IEEE 802.1x
authentication (EAP) is used to establish a connection with an authentication server
or access point. Encryption keys are dynamically generated to encrypt data over the
wireless link.
Cisco LEAP: Lightweight Extensible Authentication Protocol (LEAP) is used to
establish a a connection with an authentication server or access point. Wired
Equivalent Privacy (WEP) keys are dynamically generated to encrypt data over the
wireless link. A user name and password must be specified to use LEAP.
Page view 56
1 2 ... 52 53 54 55 56 57 58 59 60 61 62 ... 270 271

Comments to this Manuals

No comments