User Guide
Page 165
... Protocol) is done in the Wireless screen. However, PEAP only supports EAP methods, such as PAP, CHAP, MS-CHAP and MS-CHAP v2. Note: EAP-MD5 cannot be used to authenticate the clients, thus hiding client identity. After validating the identity of certificates is a Cisco implementation...WEP Key Exchange Wireless LANs 165 Dynamic WEP Key Exchange The AP maps a unique key that is not necessary to establish a secure connection. G-1000 User's Guide EAP-TLS (Transport Layer Security) With EAP-TLS, digital certifications are needed by Cisco. You may still configure and store keys...
... Protocol) is done in the Wireless screen. However, PEAP only supports EAP methods, such as PAP, CHAP, MS-CHAP and MS-CHAP v2. Note: EAP-MD5 cannot be used to authenticate the clients, thus hiding client identity. After validating the identity of certificates is a Cisco implementation...WEP Key Exchange Wireless LANs 165 Dynamic WEP Key Exchange The AP maps a unique key that is not necessary to establish a secure connection. G-1000 User's Guide EAP-TLS (Transport Layer Security) With EAP-TLS, digital certifications are needed by Cisco. You may still configure and store keys...