background image

 

17

 

3.2.1.3  802.1x Setting-Certification 

Parameter Description 

Authentication Type 

The EAP authentication protocols this card has supported are 

included as follows. This setting has to be consistent with the 

wireless APs or Routers that the card intends to connect. 

 

PEAP &TTLS

 – PEAP and TTLS are similar and easier than TLS 

in that they specify a stand-alone authentication protocol be used 

within an encrypted tunnel. TTLS supports any protocol within its 

tunnel, including CHAP, MS-CHAP, MS-CHAPv2, PAP and 

EAP-MD5. PEAP specifies that an EAP-compliant authentication 

protocol must be used; this card supports EAP-MSCHAP v2, 

EAP-TLS/Smart Card and Generic Token Card. The client 

certificate is optional required for the authentication. 

 

TLS/Smart Card

 –TLS is the most secure of the EAP protocols 

but not easy to use. It requires that digital certificates be 

exchanged in the authentication phase. The server presents a 

certificate to the client. After validating the server’s certificate, the 

client presents a client certificate to the server for validation.   

 

 

Session Resumption 

There are “Disabled”, “Reauthentication”, “Roaming”, “SameSsid” 

and “Always” selections for you to choose whether to recovery the 

session in different status. 

 

 

Password 

Enter the password as the identity for the server. 

 

 

Use Client Certificate 

A client certificate is required for TLS, and is optional for TTLS and 

PEAP. This forces a client certificate to be selected from the 

appropriate Windows Certificate Store and made available to the 

RADIUS server for certification. 

 

 

Tunneled Authentication 

 

     Protocol 

When the authentication type is PEAP or TTLS, select a protocol 

to be used to build the encrypted tunnel. 

 

 

     Identity 

This is the protected user EAP Identity used for authentication. 

The identity specified may contain up to 63 ASCII characters, is 

case sensitive and takes the form of a Network Access Identifier, 

consisting of <name of the user>@<user’s home realm>. The 

user’s home realm is optional and indicates the routing domain. 

 

 

          Password 

The password used for authentication. It may contain up to 63 

ASCII characters and is case sensitive. 

 

Summary of Contents for EW-7108PCg

Page 1: ...8 80 02 2 1 11 1g g W Wi ir re el le es ss s L LA AN N P PC C C Ca ar rd d User Manual Version 1 1 Jul 2006...

Page 2: ...arranties merchantability or fitness for any particular purpose Any software described in this manual is sold or licensed as is Should the programs prove defective following their purchase the buyer a...

Page 3: ...paration between the equipment and receiver 3 Connect the equipment into an outlet on a circuit different from that to which the receiver is connected 4 Consult the dealer or an experienced radio tech...

Page 4: ...ipment and telecommunication terminal Equipment and the mutual recognition of their conformity R TTE The R TTE Directive repeals and replaces in the directive 98 13 EEC Telecommunications Terminal Equ...

Page 5: ...1 1 Configuration 11 3 2 1 2 Authentication and Security 13 3 2 1 3 802 1x Setting Certification 17 3 2 1 4 802 1x Setting CA Server 18 3 3 Link Status 19 3 4 Statistics 20 3 5 Advance 20 3 6 QoS 23 3...

Page 6: ...are required to authorize before accessing to APs or AP Routers and the data transmitted in the network is encrypted decrypted by a dynamically changed secret key Furthermore this card supports WPA2...

Page 7: ...orts the most popular operating system Windows 98SE Me 2000 XP 2003 Server Supports 32 bit Cardbus interface 1 2 Specifications Standards IEEE 802 11b g Interface 32 bit Cardbus Frequency Band 2 4000...

Page 8: ...installation please check the items of your package The package should include the following items One PC Card One CD Driver Utility User s Manual One Quick Guide If any of the above items is missing...

Page 9: ...m the CD Note2 The following installation was operated under Windows XP Procedures are similar for Windows 98SE Me 2000 2003 Server Note3 If you have installed the Turbo Wireless LAN PC Card driver ut...

Page 10: ...ion Tool or the Ralink Configuration Tool for the card It is recommended to choose the Ralink Configuration Tool for the card Click Next to continue D If you need the card to operate with better perfo...

Page 11: ...the software of the card Please follow the instructions of the program to plug in the card into the Cardbus slot of your computer And the system will automatically detect the card F Please click Fini...

Page 12: ...ss device which has better signal strength and no wireless security setting The Ralink Configuration Utility appears as an icon on the system tray of Windows while the card is running You can open the...

Page 13: ...8 Second Way A Right click the icon and select View Available Wireless Networks B Click Advanced C Uncheck Use Windows to configure my wireless network settings to enable the utility for the card...

Page 14: ...connection to another networks or add one of the networks to your own profile list Parameter Description Available Networks This list shows all available wireless networks within range of your card It...

Page 15: ...relative settings of the profiles including Profile Name SSID Channel etc This sign indicates the activated profile is been connecting This sign indicates the activated profile is not been connecting...

Page 16: ...s You may specify a SSID for the card and then only the device with the same SSID can interconnect to the card If you want to add the network nearby to the profile list pull down the menu all the netw...

Page 17: ...Auto mode is selected the card will auto switch the preamble mode depending on the wireless devices the card is connecting to RTS Threshold Minimum packet size required for an RTS Request To Send For...

Page 18: ...be selected for use only when limited vendor choice for client access point and server products is not a concern When you have set up LEAP authentication you have to enter the user name and password...

Page 19: ...d small business The difference between WPA PSK and WPA2 PSK is that WPA2 PSK provides data encryption via the AES In contrast WPA PSK uses Temporal Key Integrity Protocol TKIP WPA NONE WPA NONE is de...

Page 20: ...e wireless stations in the network WEP Key Key1 Key4 The WEP keys are used to encrypt data transmitted in the wireless network There are two types of key length 64 bit and 128 bit Select the default e...

Page 21: ...on on the LAN it sends an EAP Request for the user s identity to the device EAP or the Extensible Authentication Protocol is an authentication protocol that runs before network layer protocols transmi...

Page 22: ...dating the server s certificate the client presents a client certificate to the server for validation Session Resumption There are Disabled Reauthentication Roaming SameSsid and Always selections for...

Page 23: ...ty by placing the issuer s self signed certificate which contains the issuer s public key into the trusted root certification authority certificate store of the host computer Intermediate or subordina...

Page 24: ...n and reception rate of the network The maximum transmission rate is 54Mbps Throughput Kbps Display the speed of data transmitted and received Link Quality This bar indicates the quality of the link T...

Page 25: ...This option enables you to view the statistic information of the connection including transmit statistics and receive statistics You may reset the counters by clicking Reset Counter 3 5 Advance This o...

Page 26: ...g Only G This card can be compatible with both 802 11g and 802 11b wireless stations If there are only 802 11g wireless stations in the network you can set the card to this mode Select Your Country Re...

Page 27: ...ion before it gets an acknowledgment back from the receiver that it has gotten some of it When the Router or AP the card is connecting to have set up the TCP Window you can enable the parameter to mee...

Page 28: ...authenticates the client so quickly that there is no perceptible delay in voice or other time sensitive applications Enable Radio Measurement When this parameter is enabled the Cisco AP can run the ra...

Page 29: ...ct Link Direct Link Setup MAC Address Specify the MAC Address of the client card you want to direct link to and click Apply to add into DLS Status table Timeout Value Specify the timeout value for the...

Page 30: ...ith the proprietary Turbo Mode feature the Turbo Mode will be enabled automatically without any configuration 3 9 SoftAP This card can run as a wireless AP The relative configurations of the AP includ...

Page 31: ...he wireless cards connected to the AP should set up the same channel SSID The SSID up to 32 printable ASCII characters is the unique name identified in a WLAN The ID prevents the unintentional merging...

Page 32: ...sync field Short Preamble 56 bits sync field Beacon ms Here defines the time between two beacons the default value is 100ms TX Power If you want to lower the transmit power of the AP for saving the po...

Page 33: ...mode designed for home and small business users who do not have access to network authentication servers In this mode known as Pre Shared Key the user manually enters the starting password in their a...

Page 34: ...bers This same key must be used on all of the wireless stations in the network Group Rekey Interval This function is available when using WPA PSK and WPA2 PSK encryption algorithm The key will change...

Page 35: ...nect to the AP Reject All The wireless cards with the MAC Address listed in Access List will be rejected to connect to the AP MAC Address MAC Address is a unique identification for hardware devices in...

Page 36: ...of the wireless cards connected to the AP Parameter Description MAC Address The MAC Address of the wireless cards connected to the AP AID The Association ID of current connection Power Saving Mode The...

Page 37: ...event time and message You may clear the table by clicking Clear 3 9 5 Statistics The Statistics page displays the statistic information of the AP including transmit statistics and receive statistics...

Page 38: ...33 3 9 6 About The About page displays the basic information about the Utility including Driver Utility and EEPROM Version The MAC Address of the card is displayed in the screen as well...

Page 39: ...ludes the modulation schemes found in 802 11b including CCK for 11 and 5 5 Mbps and Barker code modulation for 2 and 1 Mbps B A protection mechanism called RTS CTS that governs how 802 11g devices and...

Page 40: ...with Netware Windows 2000 or other LAN operating systems to support printer or file sharing 11 Would the information be intercepted while transmitting on air WLAN features two fold protection in secur...

Page 41: ...f the IEEE 802 11e WLAN QoS draft standard WMM adds prioritized capabilities to Wi Fi networks and optimizes their performance when multiple concurring applications each with different latency and thr...

Reviews: