2-17
-
Delete:
Delete the profile, provided that it is not the active profile.
-
Scan:
Open a window that lists access points that are broadcasting their
SSIDs. Each time you tap the Refresh button, you view an updated list of
APs, with each row showing an AP‘s SSID, its received signal strength
indication (RSSI), and whether or not data encryption is in use (true or
false). You can sort the list by clicking on the column headers. If you are
authorized as an administrator, select an SSID in the list, and tap Commit,
you return to the Profile tab to create a profile for that SSID.
Radio:
Radio attributes in the list box can be selected individually. When an
attribute is selected, the current setting or an appropriate selection box with the
current setting highlighted appears on the right.
Security:
Values for the two primary security attributes, EAP type and
encryption type, are displayed in separate dropdown lists, with the current values
highlighted. When you as an administrator select an EAP type, the Credentials
button appears; when you tap it, a dialog box appears that enables you to define
authentication credentials for that EAP type. When you as an administrator select
an encryption type that requires the definition of WEP keys or a pre-shared key,
the PSKs/WEP Keys button appears; when you tap it, a dialog box appears that
enables you to define WEP keys or a PSK.
Commit:
To ensure that changes to profile settings made on the tab are saved in
the profile, you must tap the Commit button.
To cause a Summit radio to connect to a typical business WLAN, you must select a
profile that specifies the SSID, EAP type, and encryption type supported by the
WLAN:
SSID: This is the name or identification of the WLAN.
EAP type: This is the protocol used to authenticate the device and its user if the
WLAN uses the Enterprise version of Wi-Fi Protected Access (WPA) and WPA2.
SCU supports five EAP types: PEAP with EAP-MSCHAP (PEAP-MSCHAP),
PEAP with EAP-GTC (PEAP-GTC), EAP-TLS, LEAP, and EAP-FAST
Encryption: This specifies the type of key used to encrypt and decrypt
transmitted data and how that key is specified or derived. Encryption options
include:
- WPA2 or WPA with dynamic keys (derived from the EAP authentication
process)
- WPA2 or WPA with pre-shared keys
- Static WEP keys
Consult the user‘s guide for details on all profile settings, including security settings.