
Protected Setup Pages
78
MVP-9000i 9" Modero® ViewPoint® Touch Panel with Intercom
There is no end-user ability to select from the different types of PEAP.
Additional Inner Authentication choices are available to the end-user.
EAP-TTLS security is designed for wireless environments where the Radius server needs to validate directly the identity
of the client (panel) before allowing it access to the network. This validation is done by tunneling a connection through
the AP and directly between the panel and the Radius server. Once the client is identified and then validated, the Radius
server disconnects the tunnel and allows the panel to access the network directly via the target AP.
EAP-TTLS
SSID (Service Set Identifier):
Opens an on-screen keyboard to enter the SSID name used on the target AP.
The SSID is a unique name used by the AP, and is assigned to all panels on
that network. An SSID is required by the AP before the panel is
permitted to join the network.
• The SSID is case sensitive and must not exceed 32 characters.
• Make sure this setting is the same for all points in the wireless network.
• With EAP security, the SSID of the AP
must
be entered. If it is left blank,
the panel will try to connect to the first access point detected that supports
EAP. However, a successful connection is not guaranteed because the
detected AP may be connected to a RADIUS server, which may not
support this EAP type and/or have the proper user identities configured.
Identity:
Opens an on-screen keyboard. Enter an EAP Identity string (used by the
panel to identify itself to an Authentication (RADIUS) Server).
Note:
This information is similar to a username used to login to a secured
server or workstation. This works in tandem with the Password string which is
similar to the password entered to gain access to a secured workstation.
Typically, this is in the form of a username such as: [email protected].
Anonymous Identity:
Opens an on-screen keyboard. Enter an IT provided alpha-numeric string
which (similar to the username) used as the identity, but that does not
represent a real user.
This information is used as a fictitious name which might be seen by sniffer
programs during the initial connection and setup process between the panel
and the Radius server. In this way the real identity (username) is protected.
Typically, this is in the form of a fictitious username such as:
Password:
Opens an on-screen keyboard. Enter the network password string specified
for the user entered within the
Identity
field (used by the panel to identify itself
to an Authentication (RADIUS) Server)
Note
: This information is similar to the password entered to gain access to a
secured workstation.
Certificate Authority:
When pressed, the panel displays an on-screen Certificate Authority (CA)
File Location keyboard which allows you to enter the name of the certificate
authority file which is used to validate the server certificate. This field is
optional.
If a server certificate is used, it should first be downloaded into the panel and
the
Certificate Authority
field should then be set to the name of that certificate
file. No file path should be used for this setting as all certificates are stored in
a specific directory that the user cannot control or change.
Use the on-screen keyboard’s
Clear
button to completely erase any
previously stored network path information.
Содержание MVP-9000i
Страница 14: ...10 MVP 9000i 9 Modero ViewPoint Touch Panel with Intercom ...
Страница 38: ...Accessories 24 MVP 9000i 9 Modero ViewPoint Touch Panel with Intercom ...
Страница 56: ...Configuring Communication 42 MVP 9000i 9 Modero ViewPoint Touch Panel with Intercom ...
Страница 72: ...Setup Pages 58 MVP 9000i 9 Modero ViewPoint Touch Panel with Intercom ...
Страница 200: ...Appendix C Troubleshooting 186 MVP 9000i 9 Modero ViewPoint Touch Panel with Intercom ...
Страница 201: ...Appendix C Troubleshooting 187 Enter the Document Name Here ...