The following example describes how to use WPA with TKIP encryption using TTLS or
PEAP authentication.
1. Obtain and install a client certificate, refer to
or consult your system administrator.
2. From the
General
page, click the
Networks
tab.
3. Click the
Add
button.
4. Enter the profile and network (SSID) name.
5. Select
Infrastructure
for the operating mode.
6. Click
Next
.
7. Select
WPA
for the Network Authentication.
8. Select
TKIP
as the Data Encryption.
9. Set the authentication type to
TTLS
or
PEAP
to be used with this connection.
10. Click the
Configure
button to open the settings dialog.
11. Enter the
roaming identity
name in the Roaming Identity field. This optional
feature is the 802.1X identity supplied to the authenticator. It is recommended that
this field not contain a true identity, but instead the desired realm (e.g.
anonymous@myrealm).
12. Select the "
Certificate Issuer
" from the list. Select Any Trusted CA as the default.
●
Click the "
allow intermediate certificates
" checkbox to allow a number of
unspecified certificates to be in the server certificate chain between the
server certificate and the specified CA. If unchecked, then the specified CA
must have directly issued the server certificate.
13.
Enter the Server name.
●
If you know the server name enter this name.
●
Select the appropriate option to match the server name exactly or specify the
domain name.
14.
Authentication Protocol:
●
PEAP:
Select
MS-CHAP-V2
. This parameter specifies the authentication
protocol operating over the PEAP tunnel. The protocols are: MS-CHAP-V2
(Default), GTC, and TLS.
●
TTLS:
Select
PAP
. This parameter specifies the authentication protocol
operating over the TTLS tunnel. The protocols are: PAP (Default), CHAP,
MD5, MS-CHAP and MS-CHAP-V2.
15.
Enter the user name.
This username must match the user name that is set in the
authentication server by the IT administrator prior to client's authentication. The
user name is case-sensitive. This name specifies the identity supplied to the
authenticator by the authentication protocol operating over the TLS tunnel. This
user’s identity is securely transmitted to the server only after an encrypted channel
Содержание 2200BG
Страница 1: ...User s Guide PRO Wireless 2200BG Network Connection Model WM3B2200BG ...
Страница 10: ...Back to Contents Page Please read all restrictions and disclaimers ...
Страница 76: ...Back to Contents Please read all restrictions and disclaimers ...
Страница 78: ...Corporate Web Site http www intel com Back to Contents Page Please read all restrictions and disclaimers ...