LINKSYS WPC300NV1 Wireless-N Notebook Adapter User Manual

LINKSYS LLC Wireless-N Notebook Adapter Book

a href="https://usermanual.wiki/LINKSYS" itemprop="url"> LINKSYS >

Contents

Manual 2

27Chapter 5: Using the Wireless Network MonitorCreate a New ProfileWireless-N Notebook AdapterPSKPSK two encryption methods, TKIP and AES, with dynamic encryption keys. Select TKIP or AES for encryption. Then enter a Pre-shared Key that is 8-63 characters in length.Encryption - Select the type of algorithm you want to use, TKIP or AES, from the Encryption drop-down menu.Pre-shared Key - Enter a Pre-shared Key of 8-63 characters in the Pre-shared Key field. Click the Next button to continue or the Back button to return to the previous screenPSK2Enter a Pre-shared Key that is 8-63 characters in length.Pre-shared Key - Enter a Pre-shared Key of 8-63 characters in the Pre-shared Key field. Click the Next button to continue or the Back button to return to the previous screen.wpa (wi-fi protected access: a wireless security protocol using TKIP (Temporal Key Integrity Protocol) encryption, which can be used in conjunction with a RADIUS server.Figure 5-20: Wireless Security - PSKFigure 5-21: Wireless Security - PSK2
28Chapter 5: Using the Wireless Network MonitorCreate a New ProfileWireless-N Notebook AdapterPSK+RADIUSPSK+RADIUS features PSK security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) PSK+RADIUS offers two authentication methods, EAP-TLS and PEAP, as well as two encryption methods, TKIP and AES, with dynamic encryption keys.Authentication - Select the authentication method your network is using, EAP-TLS or PEAP.EAP-TLSIf you selected EAP-TLS, enter the login name of your wireless network in the Login Name field. Enter the name of the authentication server in the Server Name field (this is optional). From the Certificate drop-down menu, select the certificate you have installed to authenticate you on your wireless network. Select the type of encryption, TKIP or AES, from the Encryption drop-down menu.Click the Next button to continue or the Back button to return to the previous screen.PEAPIf you selected PEAP, enter the login name of your wireless network in the Login Name field. Enter the password of your wireless network in the Password field. Enter the name of the authentication server in the Server Name field (this is optional). From the Certificate drop-down menu, select the certificate you have installed to authenticate you on your wireless network; if you want to use any certificate, keep the default setting, Trust Any. Then select the authentication method used inside the PEAP tunnel. Select the type of encryption, TKIP or AES, from the Encryption drop-down menu.Click the Next button to continue or the Back button to return to the previous screen.Figure 5-22: Wireless Security - PSK+RADIUS - EAP-TLSFigure 5-23: Wireless Security - PSK+RADIUS - PEAP
Download:
Mirror Download [FCC.gov]
Document ID651808
Application IDUr+m06j8BnEBxD5RKqcSlg==
Document DescriptionManual 2
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize190.73kB (2384096 bits)
Date Submitted2006-04-27 00:00:00
Date Available2006-09-09 00:00:00
Creation Date2006-03-27 16:16:56
Producing SoftwareAcrobat Distiller 6.0 (Windows)
Document Lastmod2006-04-27 19:44:53
Document TitleBook Template.book
Document CreatorFrameMaker 7.0
Document Author: bewalter
FCC ID Filing: Q87-WPC300NV1

Navigation menu