background image

 

17

 

3.2.1.3  802.1x Setting-Certification 

Parameter Description 

Authentication Type 

The EAP authentication protocols this adapter has supported are 

included as follows. This setting has to be consistent with the 

wireless APs or Routers that the adapter intends to connect. 

 

PEAP &TTLS

 – PEAP and TTLS are similar and easier than TLS 

in that they specify a stand-alone authentication protocol be used 

within an encrypted tunnel. TTLS supports any protocol within its 

tunnel, including CHAP, MS-CHAP, MS-CHAPv2, PAP and 

EAP-MD5. PEAP specifies that an EAP-compliant authentication 

protocol must be used; this adapter supports EAP-MSCHAP v2, 

EAP-TLS/Smart Card and Generic Token Card. The client 

certificate is optional required for the authentication. 

 

TLS/Smart Card

 –TLS is the most secure of the EAP protocols 

but not easy to use. It requires that digital certificates be 

exchanged in the authentication phase. The server presents a 

certificate to the client. After validating the server’s certificate, the 

client presents a client certificate to the server for validation.   

 

 

Session Resumption 

There are “Disabled”, “Reauthentication”, “Roaming”, “SameSsid” 

and “Always” selections for you to choose whether to recovery the 

session in different status. 

 

 

Password 

Enter the password as the identity for the server. 

 

 

Use Client Certificate 

A client certificate is required for TLS, and is optional for TTLS and 

PEAP. This forces a client certificate to be selected from the 

appropriate Windows Certificate Store and made available to the 

RADIUS server for certification. 

 

 

Tunneled Authentication 

 

     Protocol 

When the authentication type is PEAP or TTLS, select a protocol 

to be used to build the encrypted tunnel. 

 

 

     Identity 

This is the protected user EAP Identity used for authentication. 

The identity specified may contain up to 63 ASCII characters, is 

case sensitive and takes the form of a Network Access Identifier, 

consisting of <name of the user>@<user’s home realm>. The 

user’s home realm is optional and indicates the routing domain. 

 

 

          Password 

The password used for authentication. It may contain up to 63 

ASCII characters and is case sensitive. 

 

Summary of Contents for EW-7618Ug

Page 1: ...8 80 02 2 1 11 1g g U US SB B X XR R T TM M W Wi ir re el le es ss s L LA AN N U US SB B A Ad da ap pt te er r User Manual Version 1 1 Jun 2006...

Page 2: ...arranties merchantability or fitness for any particular purpose Any software described in this manual is sold or licensed as is Should the programs prove defective following their purchase the buyer a...

Page 3: ...tween the equipment and receiver 3 Connect the equipment into an outlet on a circuit different from that to which the receiver is connected 4 Consult the dealer or an experienced radio technician for...

Page 4: ...of those who install and use it However special attention must be paid to the dangers of electric shock and static electricity when working with electrical equipment All guidelines of this and of the...

Page 5: ...1 1 Configuration 11 3 2 1 2 Authentication and Security 13 3 2 1 3 802 1x Setting Certification 17 3 2 1 4 802 1x Setting CA Server 18 3 3 Link Status 19 3 4 Statistics 20 3 5 Advance 20 3 6 QoS 23 3...

Page 6: ...e the wireless network will be more effective For WLAN security issues this adapter supports 64 128 bit WEP data encryption that protects your wireless network from eavesdropping It also supports WPA...

Page 7: ...a wireless AP Automatic fallback increases data security and reliability Supports the most popular operating system Windows 98SE Me 2000 XP 2003 Server Supports USB 2 0 1 1 interface 1 2 Specificatio...

Page 8: ...eck the items of your package The package should include the following items One USB XR TM Adapter One USB to Mini USB Extension Cable One CD Driver Utility User s Manual One Quick Guide If any of the...

Page 9: ...the CD Note2 The following installation was operated under Windows XP Procedures are similar for Windows 98SE Me 2000 2003 Server Note3 If you have installed the Turbo Wireless LAN USB Adapter driver...

Page 10: ...Tool or the Ralink Configuration Tool for the adapter It is recommended to choose the Ralink Configuration Tool for the adapter Click Next to continue D If you need the adapter to operate with better...

Page 11: ...he software of the adapter Please follow the instructions of the program to plug in the adapter into the USB port of your computer And the system will automatically detect the adapter F Please click F...

Page 12: ...reless device which has better signal strength and no wireless security setting The Ralink Configuration Utility appears as an icon on the system tray of Windows while the adapter is running You can o...

Page 13: ...8 Second Way A Right click the icon and select View Available Wireless Networks B Click Advanced C Uncheck Use Windows to configure my wireless network settings to enable the utility for the adapter...

Page 14: ...connection to another networks or add one of the networks to your own profile list Parameter Description Available Networks This list shows all available wireless networks within range of your adapter...

Page 15: ...elative settings of the profiles including Profile Name SSID Channel etc This sign indicates the activated profile is been connecting This sign indicates the activated profile is not been connecting A...

Page 16: ...may specify a SSID for the adapter and then only the device with the same SSID can interconnect to the adapter If you want to add the network nearby to the profile list pull down the menu all the netw...

Page 17: ...uto mode is selected the adapter will auto switch the preamble mode depending on the wireless devices the adapter is connecting to RTS Threshold Minimum packet size required for an RTS Request To Send...

Page 18: ...d be selected for use only when limited vendor choice for client access point and server products is not a concern When you have set up LEAP authentication you have to enter the user name and password...

Page 19: ...d small business The difference between WPA PSK and WPA2 PSK is that WPA2 PSK provides data encryption via the AES In contrast WPA PSK uses Temporal Key Integrity Protocol TKIP WPA NONE WPA NONE is de...

Page 20: ...e wireless stations in the network WEP Key Key1 Key4 The WEP keys are used to encrypt data transmitted in the wireless network There are two types of key length 64 bit and 128 bit Select the default e...

Page 21: ...on on the LAN it sends an EAP Request for the user s identity to the device EAP or the Extensible Authentication Protocol is an authentication protocol that runs before network layer protocols transmi...

Page 22: ...validating the server s certificate the client presents a client certificate to the server for validation Session Resumption There are Disabled Reauthentication Roaming SameSsid and Always selections...

Page 23: ...ty by placing the issuer s self signed certificate which contains the issuer s public key into the trusted root certification authority certificate store of the host computer Intermediate or subordina...

Page 24: ...n and reception rate of the network The maximum transmission rate is 54Mbps Throughput Kbps Display the speed of data transmitted and received Link Quality This bar indicates the quality of the link T...

Page 25: ...This option enables you to view the statistic information of the connection including transmit statistics and receive statistics You may reset the counters by clicking Reset Counter 3 5 Advance This o...

Page 26: ...setting Only G This adapter can be compatible with both 802 11g and 802 11b wireless stations If there are only 802 11g wireless stations in the network you can set the adapter to this mode Select You...

Page 27: ...before it gets an acknowledgment back from the receiver that it has gotten some of it When the Router or AP the adapter is connecting to have set up the TCP Window you can enable the parameter to mee...

Page 28: ...authenticates the client so quickly that there is no perceptible delay in voice or other time sensitive applications Enable Radio Measurement When this parameter is enabled the Cisco AP can run the ra...

Page 29: ...Link Direct Link Setup MAC Address Specify the MAC Address of the client adapter you want to direct link to and click Apply to add into DLS Status table Timeout Value Specify the timeout value for the...

Page 30: ...with the proprietary Turbo Mode feature the Turbo Mode will be enabled automatically without any configuration 3 9 SoftAP This adapter can run as a wireless AP The relative configurations of the AP in...

Page 31: ...eless adapters connected to the AP should set up the same channel SSID The SSID up to 32 printable ASCII characters is the unique name identified in a WLAN The ID prevents the unintentional merging of...

Page 32: ...ts sync field Short Preamble 56 bits sync field Beacon ms Here defines the time between two beacons the default value is 100ms TX Power If you want to lower the transmit power of the AP for saving the...

Page 33: ...mode designed for home and small business users who do not have access to network authentication servers In this mode known as Pre Shared Key the user manually enters the starting password in their a...

Page 34: ...bers This same key must be used on all of the wireless stations in the network Group Rekey Interval This function is available when using WPA PSK and WPA2 PSK encryption algorithm The key will change...

Page 35: ...nect to the AP Reject All The wireless adapters with the MAC Address listed in Access List will be rejected to connect to the AP MAC Address MAC Address is a unique identification for hardware devices...

Page 36: ...e wireless adapters connected to the AP Parameter Description MAC Address The MAC Address of the wireless adapters connected to the AP AID The Association ID of current connection Power Saving Mode Th...

Page 37: ...event time and message You may clear the table by clicking Clear 3 9 5 Statistics The Statistics page displays the statistic information of the AP including transmit statistics and receive statistics...

Page 38: ...33 3 9 6 About The About page displays the basic information about the Utility including Driver Utility and EEPROM Version The MAC Address of the adapter is displayed in the screen as well...

Page 39: ...RP includes the modulation schemes found in 802 11b including CCK for 11 and 5 5 Mbps and Barker code modulation for 2 and 1 Mbps B A protection mechanism called RTS CTS that governs how 802 11g devic...

Page 40: ...with Netware Windows 2000 or other LAN operating systems to support printer or file sharing 11 Would the information be intercepted while transmitting on air WLAN features two fold protection in secur...

Page 41: ...f the IEEE 802 11e WLAN QoS draft standard WMM adds prioritized capabilities to Wi Fi networks and optimizes their performance when multiple concurring applications each with different latency and thr...

Reviews: