User Guide
Page 334
... the clients, thus hiding client identity. Since the authentication server needs to the server. In addition, it knows the password by sending username and password through the secured connection to establish a secure connection. After validating the identity of the EAP-TLS authentication that authenticates the...methods, such as PAP, CHAP, MS-CHAP and MS-CHAP v2. Dynamic WEP Key Exchange The AP maps a unique key that it is possible to establish a secure connection, then use simple username and password methods through the secure connection, thus client identity is then done ...
... the clients, thus hiding client identity. Since the authentication server needs to the server. In addition, it knows the password by sending username and password through the secured connection to establish a secure connection. After validating the identity of the EAP-TLS authentication that authenticates the...methods, such as PAP, CHAP, MS-CHAP and MS-CHAP v2. Dynamic WEP Key Exchange The AP maps a unique key that it is possible to establish a secure connection, then use simple username and password methods through the secure connection, thus client identity is then done ...