background image

 

 

3.2.1.4 802.1x Setting-CA Server 

Parameter Description 

Use Certificate Chain 

When the EAP authentication type such as TLS, TTLS or PEAP is 

selected and required a certification to tell the client what server 

credentials to accept from the authentication server in order to 

verify the server, you have to enable this function. 

 

 

Certificate Issuer 

Choose the server from the list to issue the certificate. If “Any 

Trusted CA” is selected, any CA included in the list (provided by 

the Microsoft Certificate Store) is permitted. 

 

 

Parameter Description 

Allow Intermediate Certificates 

A server designates an issuer as a trusted root authority by 

placing the issuer's self-signed certificate, which contains the 

issuer's public key, into the trusted root certification authority 

certificate store of the host computer. Intermediate or subordinate 

certification authorities are trusted only if they have a valid 

certification path from a trusted root certification authority.   

 

Server Name 

Enter the authentication server name. 

 

 

Server name must match exactly  When selected, the server name must match exactly the server 

name found on the certificate.   

 

 

Domain name must end in 

specified name 

When selected, the server name field identifies a domain. The 

certificate must use a server name belonging to this domain or to 

one of its sub-domains (e.g. zeelans.com, where the server is 

blueberry.zeelans.com) but it may be any name used in the 

certificate name field. 

 

 

 

3.3 Link 

Status 

From the “Link Status” option, you can view all the information of the network you are connecting to. 

 

19

 

Содержание SP906GK

Страница 1: ...User s Manual Wireless LAN PCI Adapter Model No SP906GK http www micronet info...

Страница 2: ...Utility 4 3 CONFIGURATION UTILITY 7 3 1 Site Survey 9 3 2 Profile 10 3 2 1Configure the Profile 11 3 2 1 1 Configuration 11 3 2 1 2 Authentication and Security 13 3 2 1 3 802 1x Setting Certification...

Страница 3: ...ers are required to authorize before accessing to APs or AP Routers and the data transmitted in the network is encrypted decrypted by a dynamically changed secret key Furthermore this adapter supports...

Страница 4: ...E Me 2000 XP Supports 32 bit PCI interface 1 2 Specifications Standard IEEE 802 11b g Interface 32 bit PCI Frequency Band 2 4000 2 4835GHz Industrial Scientific Medical Band Modulation OFDM with BPSK...

Страница 5: ...lease check the items of your package The package should include the following items Wireless LAN PCI Adapter Quick installation guide Driver and Manual CD Detachable Antenna If any of the above items...

Страница 6: ...lease uninstall the old version completely first I Install the Hardware A Turn off your computer and remove its cover B Insert the PCI adapter to an available PCI slot firmly C Secure this adapter to...

Страница 7: ...rt the supplied CD to your CD ROM Drive Execute the Setup exe program C Click Yes to process the installation if you accept the license agreement D The system starts to install the software of the ada...

Страница 8: ...E The system will automatically detect the adapter and display Hardware Installation screen Click Continue Anyway to continue F Please click Finish to complete the installation 6...

Страница 9: ...ation Utility appears as an icon on the system tray of Windows while the adapter is running You can open the utility by double click on the icon Right click the icon there are some items for you to op...

Страница 10: ...e the Utility for the adapter please follow one of the ways as below First Way Right click the icon in the system tray and select Use RaConfig as Configuration Utility Second Way A Right click the ico...

Страница 11: ...ou open the Configuration Utility the system will scan all the channels to find all the access points stations within the accessible range of your adapter and automatically connect to the wireless dev...

Страница 12: ...works on the list double click the item on the list and the adapter will automatically connect to the selected network Rescan Button Click Rescan button to collect the new information of all the wirel...

Страница 13: ...activated the adapter will be initially connected to the profile 3 2 1 Configure the Profile 3 2 1 1 Configuration Parameter Description Profile Name Define a recognizable profile name for you to ide...

Страница 14: ...reless Mode When the adapter is set in Ad Hoc Peer to Peer Mode you can designate the wireless connection mode for the Ad Hoc network 802 11 B only This adapter can be compatible with both 802 11g and...

Страница 15: ...d this value and experience high packet error rates you can increase it again but it will likely decrease overall network performance Select a setting within a range of 256 to 2346 bytes Minor change...

Страница 16: ...ucture WPA PSK It is a special mode designed for home and small business users who do not have access to network authentication servers In this mode known as Pre Shared Key the user manually enters th...

Страница 17: ...evices in the network should use the same encryption method to ensure the communication WPA Pre Shared Key The WPA PSK key can be from 8 to 64 characters and can be letters or numbers This same key mu...

Страница 18: ...otocol PPP support as many internet service providers and enterprises do When an AP acting as an authenticator detects a wireless station on the LAN it sends an EAP Request for the user s identity to...

Страница 19: ...PEAP specifies that an EAP compliant authentication protocol must be used this adapter supports EAP MSCHAP v2 EAP TLS Smart adapter and Generic Token Adapter The client certificate is optional require...

Страница 20: ...ntication type is PEAP or TTLS select a protocol to be used to build the encrypted tunnel Identity This is the protected user EAP Identity used for authentication The identity specified may contain up...

Страница 21: ...e which contains the issuer s public key into the trusted root certification authority certificate store of the host computer Intermediate or subordinate certification authorities are trusted only if...

Страница 22: ...eception rate of the network The maximum transmission rate is 54Mbps Throughput Kbits sec Display the speed of data transmitted and received Link Quality This bar indicates the quality of the link The...

Страница 23: ...evel in the wireless environment 3 4 Statistics This option enables you to view the statistic information of the connection including transmit statistics and receive statistics You may reset the count...

Страница 24: ...mpatible with both 802 11g and 802 11b wireless stations If there are only 802 11g wireless stations in the network you can set the adapter to this mode Select Your Country Region Code The available c...

Страница 25: ...adapter to deliver the better throughput in the same period and environment Parameter Description Enable TCP Window Size The TCP Window is the amount of data a sender can send on a particular connecti...

Страница 26: ...plications Enable Radio Measurement When this parameter is enabled the Cisco AP can run the radio monitoring through the associated CCX compliant clients to continuously monitor the WLAN radio environ...

Страница 27: ...nction In addition to the Turbo Mode this adapter also supports WMM function When you use the devices such as Voice over Internet Protocol VoIP phones televisions VCRs and MP3 players IEEE 802 11e Qua...

Страница 28: ...B Right Click the Wireless Network Connection and select Properties C Click Configure 26...

Страница 29: ...D Select Advanced page enable the WMM Capable 27...

Страница 30: ...es the modulation schemes found in 802 11b including CCK for 11 and 5 5 Mbps and Barker code modulation for 2 and 1 Mbps B A protection mechanism called RTS CTS that governs how 802 11g devices and 80...

Страница 31: ...h Netware Windows 2000 or other LAN operating systems to support printer or file sharing 11 Would the information be intercepted while transmitting on air WLAN features two fold protection in security...

Страница 32: ...her words more bandwidth is consumed than in the case of narrowband transmission but the trade off produces a signal that is in effect louder and thus easier to detect provided that the receiver knows...

Отзывы: