Set the Wireless Authentication Method

From the Encryption (Authentication) drop-down list in the wireless access point configuration, select the level of authentication method for your wireless connections. The eight available authentication methods, from least secure to most secure, are listed below. Select the most secure authentication method that is supported by your wireless network clients.

Open System and Shared Key

The Open System and Shared Key authentication methods use WEP encryption. WEP is not as secure as WPA2 and WPA (Wi-Fi Protected Access). We recommend you do not use these less secure methods unless your wireless clients do not support WPA or WPA2.

WPA and WPA2 with Pre-Shared Keys

WPA (PSK) and WPA2 (PSK) Wi-Fi Protected Access methods use pre-shared keys for authentication. WPA (PSK) and WPA2 (PSK) are more secure than WEP shared key authentication. When you choose one of these methods, you configure a pre-shared key that all wireless devices must use to authenticate to the wireless access point.

The XTM wireless device supports three wireless authentication settings that use pre-shared keys:

WPA and WPA2 with Enterprise Authentication

The WPA Enterprise and WPA2 Enterprise authentication methods use the IEEE 802.1X standard for network authentication. These authentication methods use the EAP (Extensible Authentication Protocol) framework to enable user authentication to an external RADIUS authentication server or to the XTM device (Firebox-DB). The WPA Enterprise and WPA2 Enterprise authentication methods are more secure than WPA/WPA2 (PSK) because users authenticate with their own credentials instead of a shared key.

Fireware XTM v11.4 and later supports three WPA and WPA2 Enterprise wireless authentication methods:

For more information about these authentication methods, see WPA and WPA2 Enterprise Authentication.

To use the Enterprise authentication methods, you must configure an external RADIUS authentication server or configure the XTM device as an authentication server.

For more information about how to configure the settings for these authentication methods, see

See Also

Set the Encryption Level

WPA and WPA2 Enterprise Authentication

Give Us Feedback  •   Get Support  •   All Product Documentation  •   Knowledge Base