{"id":12677,"date":"2024-03-28T05:24:30","date_gmt":"2024-03-28T04:24:30","guid":{"rendered":"https:\/\/kb.apptec360.com\/manual\/knowledgebase\/allgemein-2\/verbindungsmanagement\/wifi\/sicherheit-typ\/"},"modified":"2024-12-04T05:03:48","modified_gmt":"2024-12-04T04:03:48","slug":"sicherheit-typ","status":"publish","type":"knowledgebase","link":"https:\/\/kb.apptec360.com\/manual\/de\/knowledgebase\/konfiguration-windows-10-pc\/allgemein-2\/verbindungsmanagement\/wifi\/sicherheit-typ\/","title":{"rendered":"Sicherheit Typ"},"content":{"rendered":"\n<p>AP-Sicherheitstyp einrichten<\/p>\n\n<table id=\"tablepress-316\" class=\"tablepress tablepress-id-316\">\n<caption style=\"caption-side:bottom;text-align:left;border:none;background:none;margin:0;padding:0;\"><a href=\"https:\/\/kb.apptec360.com\/manual\/wp-admin\/admin.php?page=tablepress&#038;action=edit&#038;table_id=316\" rel=\"nofollow\">bearbeiten<\/a><\/caption>\n<tbody class=\"row-hover\">\n<tr class=\"row-1 odd\">\n\t<td colspan=\"2\" class=\"column-1\"><br\/>\n        <p><strong>WEP Offenes System<\/strong><\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-2 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Passwort<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Passwort f\u00fcr den AP<\/p><br\/>\n      <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n<table id=\"tablepress-317\" class=\"tablepress tablepress-id-317\">\n<caption style=\"caption-side:bottom;text-align:left;border:none;background:none;margin:0;padding:0;\"><a href=\"https:\/\/kb.apptec360.com\/manual\/wp-admin\/admin.php?page=tablepress&#038;action=edit&#038;table_id=317\" rel=\"nofollow\">bearbeiten<\/a><\/caption>\n<tbody class=\"row-hover\">\n<tr class=\"row-1 odd\">\n\t<td colspan=\"2\" class=\"column-1\"><br\/>\n        <p><strong>WPA PSK<\/strong><\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-2 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Passwort<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Passwort f\u00fcr den AP<\/p><br\/>\n      <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n<div class=\"pagebreak-after\"><\/div>\n\n<table id=\"tablepress-318\" class=\"tablepress tablepress-id-318\">\n<caption style=\"caption-side:bottom;text-align:left;border:none;background:none;margin:0;padding:0;\"><a href=\"https:\/\/kb.apptec360.com\/manual\/wp-admin\/admin.php?page=tablepress&#038;action=edit&#038;table_id=318\" rel=\"nofollow\">bearbeiten<\/a><\/caption>\n<tbody class=\"row-hover\">\n<tr class=\"row-1 odd\">\n\t<td colspan=\"2\" class=\"column-1\"><br\/>\n        <p><strong>WPA EAP<\/strong><\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-2 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Art der Authentifizierung<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Authentifizierungstyp, nur m\u00f6glich mit &#8222;PEAP-MSCAHPv2&#8220;.<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-3 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Schnelles Wiederverbinden<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Ger\u00e4te k\u00f6nnen zwischen Access Points wechseln, ohne sich erneut authentifizieren zu m\u00fcssen<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-4 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Gastzugang<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Der Benutzer hat kein Konto und sollte sich daher als Gast registrieren<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-5 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Quarant\u00e4ne-Kontrollen<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Der Client muss NAP-Checks (Network Access Protection) durchf\u00fchren und die Ergebnisse an das System weitergeben, das dann entscheidet, ob der Client eine Verbindung herstellen kann.<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-6 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Krypto-Bindung erforderlich machen<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Authentifizierung ist nur \u00fcber Crypto Binding m\u00f6glich<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-7 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Server-Validierung<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Der Client \u00fcberpr\u00fcft, ob das Serverzertifikat g\u00fcltig ist. Wenn dies der Fall ist, wird eine Verbindung hergestellt<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-8 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Aufforderung zur Vorlage von Zertifikaten<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Erm\u00f6glicht es dem Benutzer, nicht vertrauensw\u00fcrdige Zertifikate zu akzeptieren<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-9 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Server-Namen<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Bietet die M\u00f6glichkeit, den Namen des RADIUS-Servers anzuzeigen, der die Netzwerkauthentifizierung und -autorisierung anbietet<\/p><br\/>\n      <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n<table id=\"tablepress-319\" class=\"tablepress tablepress-id-319\">\n<caption style=\"caption-side:bottom;text-align:left;border:none;background:none;margin:0;padding:0;\"><a href=\"https:\/\/kb.apptec360.com\/manual\/wp-admin\/admin.php?page=tablepress&#038;action=edit&#038;table_id=319\" rel=\"nofollow\">bearbeiten<\/a><\/caption>\n<tbody class=\"row-hover\">\n<tr class=\"row-1 odd\">\n\t<td colspan=\"2\" class=\"column-1\"><br\/>\n        <p><strong>WPA2-PSK<\/strong><\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-2 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Passwort<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>AP-Kennwort<\/p><br\/>\n      <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n<div class=\"pagebreak-after\"><\/div>\n\n<table id=\"tablepress-320\" class=\"tablepress tablepress-id-320\">\n<caption style=\"caption-side:bottom;text-align:left;border:none;background:none;margin:0;padding:0;\"><a href=\"https:\/\/kb.apptec360.com\/manual\/wp-admin\/admin.php?page=tablepress&#038;action=edit&#038;table_id=320\" rel=\"nofollow\">bearbeiten<\/a><\/caption>\n<tbody class=\"row-hover\">\n<tr class=\"row-1 odd\">\n\t<td colspan=\"2\" class=\"column-1\"><br\/>\n        <p><strong>WPA2 EAP<\/strong><\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-2 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Art der Authentifizierung<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Authentifizierungstyp, nur m\u00f6glich mit &#8222;PEAP-MSCAHPv2&#8220;.<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-3 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Schnelles Wiederverbinden<\/p><br\/>\n      <\/td><td class=\"column-2\"><\/td>\n<\/tr>\n<tr class=\"row-4 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Gastzugang<\/p><br\/>\n      <\/td><td class=\"column-2\"><\/td>\n<\/tr>\n<tr class=\"row-5 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Quarant\u00e4ne-Kontrollen<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Aktiviert den Netzwerkzugriffsschutz NAP<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-6 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Krypto-Bindung erforderlich machen<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Authentifizierung ist nur \u00fcber Crypto Binding m\u00f6glich<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-7 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Server-Validierung<\/p><br\/>\n      <\/td><td class=\"column-2\"><\/td>\n<\/tr>\n<tr class=\"row-8 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Aufforderung zur Vorlage von Zertifikaten<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Fragt nach einem validierten Serverzertifikat, Namen oder einer Root-Zertifikat-Authentifizierung (CA)<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-9 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Server-Namen<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Auflistung der Server, die von den Ger\u00e4ten als vertrauensw\u00fcrdig eingestuft werden sollen<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-10 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Keine<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Keine etablierte Sicherheit<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-11 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Proxy-Server verwenden<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Verwendung eines Proxyservers<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-12 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Server Adresse<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Adresse des Proxy-Servers<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-13 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Server-Anschluss<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Server-Port des Proxy-Servers<\/p><br\/>\n      <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"parent":12673,"menu_order":0,"template":"","class_list":["post-12677","knowledgebase","type-knowledgebase","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/kb.apptec360.com\/manual\/de\/wp-json\/wp\/v2\/knowledgebase\/12677","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kb.apptec360.com\/manual\/de\/wp-json\/wp\/v2\/knowledgebase"}],"about":[{"href":"https:\/\/kb.apptec360.com\/manual\/de\/wp-json\/wp\/v2\/types\/knowledgebase"}],"version-history":[{"count":1,"href":"https:\/\/kb.apptec360.com\/manual\/de\/wp-json\/wp\/v2\/knowledgebase\/12677\/revisions"}],"predecessor-version":[{"id":12678,"href":"https:\/\/kb.apptec360.com\/manual\/de\/wp-json\/wp\/v2\/knowledgebase\/12677\/revisions\/12678"}],"up":[{"embeddable":true,"href":"https:\/\/kb.apptec360.com\/manual\/de\/wp-json\/wp\/v2\/knowledgebase\/12673"}],"wp:attachment":[{"href":"https:\/\/kb.apptec360.com\/manual\/de\/wp-json\/wp\/v2\/media?parent=12677"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}