![Qeedji TAB10s User Manual Download Page 65](http://html2.mh-extra.com/html/qeedji/tab10s/tab10s_user-manual_3061205065.webp)
65
In case
WPA-Enterprise (EAP)
and
WPA2-Enterprise (EAP)
security:
choose one
EAP method
among
PWD
,
PEAP
,
TLS
and
TTLS
. The chosen
EAP method
must be supported by your RADIUS server,
choose the
Phase 2 authentication
among:
NONE
,
PAP
,
MSCHAP
,
MSCHAPV2
,
GTC
. The chosen
Phase 2 authentication
must be supported by your
RADIUS server and is required only for
PEAP
and
TTLS
EAP methods
.
☛
In the context of a secure network, your device must be first declared in your dedicated RADIUS server with a
identity
/
password
. For further
information, please contact your IT department.
When required, fill the
Identity
/
password
declared for your device in your RADIUS server.
☛
When displayed, the
Anonymous identity
field value is optional.
The
TLS
EAP methods
and
TLS
Phase 2 authentication
allow to provide a
802.1X user certificate
installed in your TAB10s device when required by
your RADIUS server configuration.
The
TLS
,
TTLS
, and
PEAP
EAP methods
allow to activate the
802.1X CA certificate
validation. The
802.1X CA certificate
must be installed first in your
TAB10s device. For further information about certificates installation, refer to the chapter §
☛
The
802.1X CA certificate
is the certificate with the highest autority for your RADIUS server. For further information, please contact your IT
department.
☛
The
Domain of the 802.1X CA certificate
input is diplayed only when using the
Use system certificates
value for the
Validation of the
802.1X CA certificate
input. The
Domain of the 802.1X CA certificate
input must not be kept
empty
. In case the certificate with highest
authority for your RADIUS server is already embedded in the AOSP SYSTEM trusted credential, you can select the
Use system certificates
input
value for the
Validation of the 802.1X CA certificate
input. In this case, during the communication with the RADIUS server,
AQS
checks
whether the trusted certificate of the Radius is really trusted by a certificate with a higher authority embedded in the AOSP SYSTEM trusted
credential basis, then checks its trustness chain.
AQS
checks then, in addition, that the
commonName
value of the Radius certificate is properly
reported in the
Domain of the 802.1X CA certificate
input.
☛
When using
802.1X
certificates, in case your device is not on time or when the
802.1X
certificates expiration date has expired, the device is
not able to access to the network anymore. To work around, you have to insert one USB stick containing a suitable configuration script to install
an appropriate certificate or to update the device date and time.
Summary of Contents for TAB10s
Page 1: ...User manual TAB10s 9 10 13 002A TAB10s 8 30...
Page 5: ...5 Part I Description and installation...
Page 10: ...10 1 3 1 Device dimensions...
Page 13: ...13...
Page 25: ...25 Part II System con guration...
Page 41: ...41 This message is then displayed until the device is rebooting automatically once...
Page 49: ...49 Part III Applicative user interface...
Page 51: ...51 Part IV Administration console user interface...
Page 87: ...87 Part V Technical information...
Page 91: ...91 5 3 Antenna return loss This is the return loss diagram for the WIFI Bluetooth antenna...
Page 93: ...93 Part VI Contacts...
Page 95: ...95 Part VII Appendix...