User's Manual
your computer’s operating system and may require
additional software or hardware as well as wireless LAN
infrastructure support. Check with your computer
manufacturer for details.
TKIP (Temporal Key Integrity Protocol) is an enhancement to WEP
(Wired Equivalent Privacy) security. TKIP provides per-packet key
mixing, a message integrity check and a rekeying mechanism, which
fixes the flaws of WEP.
TLS
A type of authentication method using the Extensible Authentication
Protocol (EAP) and a security protocol called the Transport Layer
Security (TLS). EAP-TLS uses certificates which use passwords. EAP-
TLS authentication supports dynamic WEP key management. The TLS
protocol is intended to secure and authenticate communications across
a public network through data encryption. The TLS Handshake Protocol
allows the server and client to provide mutual authentication and to
negotiate an encryption algorithm and cryptographic keys before data
is transmitted.
TTLS
These settings define the protocol and the credentials used to
authenticate a user. In TTLS (Tunneled Transport Layer Security), the
client uses EAP-TLS to validate the server and create a TLS-encrypted
channel between the client and server. The client can use another
authentication protocol, typically password-based protocols, as MD5
Challenge over this encrypted channel to enable server validation. The
challenge and response packets are sent over a non-exposed TLS
encrypted channel. TTLS implementations today support all methods
defined by EAP, as well as several older methods (
PAP, CHAP, MS-CHAP
and MS-CHAPv2). TTLS can easily be extended to work with new
protocols by defining new attributes to support new protocols.
Authentication Protocols