3. Click the Configure button.
4. Select the appropriate certificate from the drop-down list.
5.
Enter a PEAP user name in the User Name field to use a separate user name and start the
PEAP authentication process.
6. Click
Advanced
and:
o
Leave the server name field blank for the client to accept a certificate from any server
with a certificate signed by the authority listed in the Network Certificate Authority
drop-down list.
(recommended)
o
Enter the domain name of the server from which the client will accept a certificate.
o
The login name used for PEAP tunnel authentication, fills in automatically as
PEAP-
xxxxxxxxxxxx
, where
xxxxxxxxxxxx
is the computer's MAC address. Change
the login name if needed.
7. Click
OK.
8. Enable the profile.
Using LEAP Security
LEAP security requires that all infrastructure devices (e.g. access points and servers) are configured for
LEAP authentication. Check with the IT manager.
1.
On the Security tab, choose the WPA radio button. Choose WPA-LEAP from the drop-down
menu.
OR: On the Security tab, choose the 802.1x radio button. Choose LEAP from the drop-down
menu.
20