Moxa ioLogik 2542-T [84/88] Iologik 2500 series wireless lan network setup and configuration for wireless lan models

Moxa ioLogik 2542 [84/88] Iologik 2500 series wireless lan network setup and configuration for wireless lan models
ioLogik 2500 Series Wireless LAN Network Setup and Configuration (for wireless LAN models)
7-5
Personal versions of WPA/WPA2, also known as WPA/WPA-PSK (Pre-Shared Key), provide a simple way of
encrypting a wireless connection for high confidentiality. A Passphrase is used as a basis for encryption
methods (or cipher types) in a WLAN connection. The passphrases should be complicated and as long as
possible. The Passphrase must have at least 8 ASCII characters, and can have as many as 63. For security
reasons, this passphrase should only be disclosed to users who need it, and it should be changed regularly.
WPA/WPA2-Enterprise
WPA type
Setting Description Factory Default
Personal Provides Pre-Shared Key-enabled WPA and WPA2 Personal
Enterprise Provides enterprise-level security for WPA and WPA2
Encryption method
Setting Description Factory Default
TKIP Temporal Key Integrity Protocol is enabled TKIP
AES Advance Encryption System is enabled
Passphrase
Setting Description Factory Default
8 to 63 characters Master key to generate keys for encryption and decryption None
EAP Protocol
Setting Description Factory Default
TLS Specifies Transport Layer Security protocol TLS
TTLS Specifies Tunneled Transport Layer Security
PEAP Specifies Protected Extensible Authentication Protocol, or
Protected EAP
WPA/WPA2-Enterprise
Also called WPA/WPA2-EAP (Extensible Authentication Protocol). In addition to device-based authentication,
WPA/WPA2-Enterprise enables user-based authentication via IEEE 802.1X. The ioLogik 2500-WL1 can
support three EAP methods: EAP-TLS, EAP-TTLS, and EAP-PEAP.
By setting WPA type to Enterprise, you can use EAP (Extensible Authentication Protocol), a framework
authentication protocol used by 802.1X to provide network authentication. In these Enterprise-level security
modes, a back-end RADIUS (Remote Authentication Dial-In User Service) server is needed if IEEE 802.1X
functionality is enabled in WPA /WPA2. The IEEE 802.1X protocol also offers the possibility of carrying out
an efficient connection authentication on a large-scale network. It is not necessary to exchange keys or
passphrases.
WPA type
Setting Description Factory Default
Personal Provides Pre-Shared Key-enabled WPA and WPA2 Personal
Enterprise Provides enterprise-level security for WPA and WPA2
Encryption method
Setting Description Factory Default
TKIP Temporal Key Integrity Protocol is enabled TKIP
AES Advanced Encryption System is enabled
Passphrase
Setting Description Factory Default
8 to 63 characters Master key to generate keys for encryption and decryption None

Содержание

Скачать