background image

 

3.2.1.4 802.1x Setting-CA Server 

 

 

 

Parameter Description 

Use Certificate Chain 

When the EAP authentication type such as TLS, TTLS or PEAP is 

selected and required a certification to tell the client what server 

credentials to accept from the authentication server in order to 

verify the server, you have to enable this function. 

 

 

Certificate Issuer 

Choose the server from the list to issue the certificate. If “Any 

Trusted CA” is selected, any CA included in the list (provided by 

the Microsoft Certificate Store) is permitted. 

 

 

Allow Intermediate Certificates 

A server designates an issuer as a trusted root authority by 

placing the issuer's self-signed certificate, which contains the 

issuer's public key, into the trusted root certification authority 

certificate store of the host computer. Intermediate or subordinate 

certification authorities are trusted only if they have a valid 

certification path from a trusted root certification authority.   

 

 

 

Server Name 

Enter the authentication server name. 

 

 

Server name must match exactly  When selected, the server name must match exactly the server 

name found on the certificate.   

 

 

Domain name must end in 

specified name 

When selected, the server name field identifies a domain. The 

certificate must use a server name belonging to this domain or to 

one of its sub-domains (e.g. zeelans.com, where the server is 

18

 

Summary of Contents for WML-3565

Page 1: ...802 11g Wireless MIMO PCMCIA Adapter WML 3565 User s Manual...

Page 2: ...turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures 1 Reorient or relocate the receiving antenna 2 Increase the separati...

Page 3: ...Iceland Liechtenstein Norway and Switzerland WEEE regulation To avoid the potential effects on the environment and human health as a result of the presence of hazardous substances in electrical and el...

Page 4: ...lation 6 3 CONFIGURATION UTILITY 8 3 1 Site Survey 9 3 2 Profile 10 3 2 1 Configure the Profile 11 3 2 1 1 Configuration 11 3 2 1 2 Authentication and Security 13 3 2 1 3 802 1x Setting Certification...

Page 5: ...ed secret key Furthermore this card supports WPA2 function WPA2 provides a stronger encryption mechanism through AES Advanced Encryption Standard which is a requirement for some corporate and governme...

Page 6: ...mental Mechanical Characteristics Temperature Operating 0 C 55 C Storage 20 C 70 C Operating Humidity Operating 10 to 90 Non Condensing Storage 5 to 95 Non Condensing Dimensions 114 x 54 x 5 mm L x W...

Page 7: ...3565 into your PC 2 1 Configuration Utility Installation 1 Insert the bundled CD into the CD ROM drive to launch the autorun program Once completed a menu screen will appear 2 Click the Configuration...

Page 8: ...URST option will be enabled to increase the transfer speed However the AP must support this feature as well If the target AP is complying with 802 11b g standard please select Optimize for WiFi mode 6...

Page 9: ...7 Please click Finish to complete the installation 5...

Page 10: ...required Just click Yes to proceed 1 After the PC restart Please insert WML 3565 into a vacant PCMCIA slot 2 The system will automatically detect the card and display Found New Hardware Wizard screen...

Page 11: ...7...

Page 12: ...n Utility appears as an icon on the system tray of Windows while the card is running You can open the utility by double click on the icon Right click the icon there are some items for you to operate t...

Page 13: ...t Parameter Description Available Networks This list shows all available wireless networks within range of your card It also displays the information of the networks including the SSID BSSID Signal St...

Page 14: ...the relative settings of the profiles including Profile Name SSID Channel etc This sign indicates the activated profile is been connecting This sign indicates the activated profile is not been connec...

Page 15: ...may specify a SSID for the WML 3565 and then only the device with the same SSID can interconnect to the card If you want to add the network nearby to the profile list pull down the menu all the netwo...

Page 16: ...is recommended to setting the card to this mode This mode is also the default setting 802 11 G only This card can be compatible with both 802 11g and 802 11b wireless stations If there are only 802 1...

Page 17: ...etworks that the card intends to connect Open No authentication is needed among the wireless network Shared Only wireless devices using a shared key WEP Key identified are allowed to connecting each o...

Page 18: ...between authorized devices WPA2 Like WPA WPA2 supports IEEE 802 1x EAP authentication or PSK technology It also includes a new advanced encryption mechanism using the Advanced Encryption Standard AES...

Page 19: ...3456aef or test1 128 bit Input 26 digit Hex values in the A F a f and 0 9 range or 13 digit ASCII characters including a z and 0 9 as the encryption keys For example 01234567890123456789abcdef or admi...

Page 20: ...authentication protocols this card has supported are included as follows This setting has to be consistent with the wireless APs or Routers that the card intends to connect PEAP TTLS PEAP and TTLS are...

Page 21: ...the password as the identity for the server Use Client Certificate A client certificate is required for TLS and is optional for TTLS and PEAP This forces a client certificate to be selected from the a...

Page 22: ...s an issuer as a trusted root authority by placing the issuer s self signed certificate which contains the issuer s public key into the trusted root certification authority certificate store of the ho...

Page 23: ...e network the card is connecting to Extra Info Display the link status Channel Display the number of the radio channel and the frequency used for the networking Link Speed Mbps Display the transmissio...

Page 24: ...ignal been received by the card This indicator helps to find the proper position of the wireless device for quality network operation Noise Level Display the noise level in the wireless environment 3...

Page 25: ...n the network you can set the card to this mode 802 11 G only This card can be compatible with both 802 11g and 802 11b wireless stations If there are only 802 11g wireless stations in the network you...

Page 26: ...you can select Tx BURST Tx Burst enables the card to deliver the better throughput in the same period and environment This feature only takes effect when the connected AP also supports Tx Burst Enabl...

Page 27: ...takes the place of the RADIUS server and authenticates the client so quickly that there is no perceptible delay in voice or other time sensitive applications Enable Radio Measurement When this parame...

Page 28: ...ion you can click the hyperlink to connect the PLANET website You can also obtain basic information about the WML 3565 such as the Driver Utility and EEPROM Version The MAC Address of the card is disp...

Page 29: ...802 11e extensions for 802 11 networks will help to define the priorities of the data traffics by the data categories to provide enhanced multimedia support When the WML 3565 is connected to the AP or...

Page 30: ...C Click Configure D Select Advanced page enable the WMM Capable 26...

Page 31: ...on when B mode station and G mode station exist concurrently CAM when AC power When use AC power it doesn t enter into sleep mode Country Region 11A Not applicable on WML 3565 Country Region 11G Suppo...

Page 32: ...ection mechanism called RTS CTS that governs how 802 11g devices and 802 11b devices interoperate 2 What is MIMO MIMO multiple input multiple output a technique for boosting wireless bandwidth and ran...

Page 33: ...highest degree of security and authenticity for digital information wherever and however communicated or stored while making more efficient use of hardware and or software than previous encryption sta...

Page 34: ...eivers 14 What is Spread Spectrum Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable secure mission critical communication systems It is d...

Reviews: