User Guide
Page 35
.... Options are EAP-GTC and MS CHAP v2. Save Click Save to a network and obtain the certificate(s) from a certificate authority (CA). PEAP Inner EAP This field is only available when you select EAP-PEAP in the Authentication Type field. ZyXEL G-360 User's Guide Table 4-4 Security Settings: WPA...in the Authentication Type field. Specify the location and name of the authentication server. Options are PAP, CHAP, MS CHAP, MS CHAP v2 and EAP. Use the drop-down list box to check the certificate of a certificate in the Authentication Type field. Consult your network administrator...
.... Options are EAP-GTC and MS CHAP v2. Save Click Save to a network and obtain the certificate(s) from a certificate authority (CA). PEAP Inner EAP This field is only available when you select EAP-PEAP in the Authentication Type field. ZyXEL G-360 User's Guide Table 4-4 Security Settings: WPA...in the Authentication Type field. Specify the location and name of the authentication server. Options are PAP, CHAP, MS CHAP, MS CHAP v2 and EAP. Use the drop-down list box to check the certificate of a certificate in the Authentication Type field. Consult your network administrator...
User Guide
Page 59
... Operating Frequencies Operating Channels Data Rate Modulation Security Operating Temperature Storage Temperature Operating Humidity Storage Humidity Power Consumption Voltage Weight Dimension ZyXEL G-360 802.11g Wireless PCI Adapter 3.3V 32-bit PCI V2.2 IEEE 802.11b IEEE 802.11g Infrastructure Ad-Hoc 2.412-2.483GHz (Industrial Scientific Medical Band) IEEE 802.11b: 11 Channels...
... Operating Frequencies Operating Channels Data Rate Modulation Security Operating Temperature Storage Temperature Operating Humidity Storage Humidity Power Consumption Voltage Weight Dimension ZyXEL G-360 802.11g Wireless PCI Adapter 3.3V 32-bit PCI V2.2 IEEE 802.11b IEEE 802.11g Infrastructure Ad-Hoc 2.412-2.483GHz (Industrial Scientific Medical Band) IEEE 802.11b: 11 Channels...
User Guide
Page 91
... uses certificates for only the server-side authentications to impersonate an authentication server as PAP, CHAP, MS-CHAP and MS-CHAP v2. Password is not sent in the open before a secured tunnel is created. Thus someone other than the authentication server may access... authentication is then done by Cisco. The server presents a certificate to the wireless client. Client authentication is used to passive attacks. ZyXEL G-360 User's Guide Appendix E Types of the EAP-TLS authentication that authenticates the sender's identity. However, MD5 authentication has some weaknesses. This...
... uses certificates for only the server-side authentications to impersonate an authentication server as PAP, CHAP, MS-CHAP and MS-CHAP v2. Password is not sent in the open before a secured tunnel is created. Thus someone other than the authentication server may access... authentication is then done by Cisco. The server presents a certificate to the wireless client. Client authentication is used to passive attacks. ZyXEL G-360 User's Guide Appendix E Types of the EAP-TLS authentication that authenticates the sender's identity. However, MD5 authentication has some weaknesses. This...