background image

 

3.2.1.4 802.1x Setting-CA Server 

 

 

 

Parameter Description 

Use Certificate Chain 

When the EAP authentication type such as TLS, TTLS or PEAP is 

selected and required a certification to tell the client what server 

credentials to accept from the authentication server in order to 

verify the server, you have to enable this function. 

 

 

Certificate Issuer 

Choose the server from the list to issue the certificate. If “Any 

Trusted CA” is selected, any CA included in the list (provided by 

the Microsoft Certificate Store) is permitted. 

 

 

Allow Intermediate Certificates 

A server designates an issuer as a trusted root authority by 

placing the issuer's self-signed certificate, which contains the 

issuer's public key, into the trusted root certification authority 

certificate store of the host computer. Intermediate or subordinate 

certification authorities are trusted only if they have a valid 

certification path from a trusted root certification authority.   

 

 

 

Server Name 

Enter the authentication server name. 

 

 

Server name must match exactly  When selected, the server name must match exactly the server 

name found on the certificate.   

 

 

Domain name must end in 

specified name 

When selected, the server name field identifies a domain. The 

certificate must use a server name belonging to this domain or to 

one of its sub-domains (e.g. zeelans.com, where the server is 

19

 

Содержание WML-8315

Страница 1: ...802 11g Wireless MIMO PCI Adapter WML 8315 User s Manual...

Страница 2: ...turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures 1 Reorient or relocate the receiving antenna 2 Increase the separati...

Страница 3: ...Iceland Liechtenstein Norway and Switzerland WEEE regulation To avoid the potential effects on the environment and human health as a result of the presence of hazardous substances in electrical and e...

Страница 4: ...Driver Installation 7 3 CONFIGURATION UTILITY 9 3 1 Site Survey 10 3 2 Profile 11 3 2 1 Configure the Profile 12 3 2 1 1 Configuration 12 3 2 1 2 Authentication and Security 14 3 2 1 3 802 1x Setting...

Страница 5: ...key Furthermore this card supports WPA2 function WPA2 provides a stronger encryption mechanism through AES Advanced Encryption Standard which is a requirement for some corporate and government users...

Страница 6: ...nical Characteristics Temperature Operating 0 C 55 C Storage 20 C 70 C Operating Humidity Operating 10 to 90 Non Condensing Storage 5 to 95 Non Condensing Dimensions 134 x 120 x 21 mm L x W x H Weight...

Страница 7: ...ration utility to your PC please do not plug WML 8315 into your PC 2 1 Configuration Utility Installation 1 Insert the bundled CD into the CD ROM drive to launch the autorun program Once completed a m...

Страница 8: ...ick Next to continue 5 If Optimize for performance mode is selected the Tx BURST option will be enabled to increase the transfer speed However the AP must support this feature as well If the target AP...

Страница 9: ...6 You can see the installation progress in this screen 7 Please click Finish to complete the installation 5...

Страница 10: ...id placing the PC close to obstacles Obstructions such as concrete walls and thick metals limit radio signal penetration and reduce the throughput and the coverage range of the PCI card y Place the PC...

Страница 11: ...e required Just click Yes to proceed 1 After the PC restart Please insert WML 8315 into a vacant PCI slot 2 The system will automatically detect the card and display Found New Hardware Wizard screen C...

Страница 12: ...8...

Страница 13: ...n Utility appears as an icon on the system tray of Windows while the card is running You can open the utility by double click on the icon Right click the icon there are some items for you to operate t...

Страница 14: ...Parameter Description Available Networks This list shows all available wireless networks within range of your card It also displays the information of the networks including the SSID BSSID Signal Str...

Страница 15: ...the relative settings of the profiles including Profile Name SSID Channel etc This sign indicates the activated profile is been connecting This sign indicates the activated profile is not been connec...

Страница 16: ...ated WLANs You may specify a SSID for the WML 8315 and then only the device with the same SSID can interconnect to the card If you want to add the network nearby to the profile list pull down the menu...

Страница 17: ...to this mode 802 11 B G mix If you have a mix of 802 11b and 802 11g wireless stations in your network it is recommended to setting the card to this mode This mode is also the default setting 802 11 G...

Страница 18: ...he networking The channel setting should be the same with the network you are connecting to 3 2 1 2 Authentication and Security Parameter Description Authentication Type This setting has to be consist...

Страница 19: ...r access point or gateway as well as in each wireless stations in the network WPA PSK takes over automatically from that point keeping unauthorized users that don t have the matching password from joi...

Страница 20: ...10 digit Hex values in the A F a f and 0 9 range or 5 digit ASCII characters including a z and 0 9 as the encryption keys For example 0123456aef or test1 128 bit Input 26 digit Hex values in the A F...

Страница 21: ...Approve or deny user login to the LAN 3 Send username password to RADIUS server Parameter Description Authentication Type The EAP authentication protocols this card has supported are included as foll...

Страница 22: ...to recovery the session in different status Identity Enter the name as the identity for the server Password Enter the password as the identity for the server Use Client Certificate A client certificat...

Страница 23: ...s an issuer as a trusted root authority by placing the issuer s self signed certificate which contains the issuer s public key into the trusted root certification authority certificate store of the ho...

Страница 24: ...e network the card is connecting to Extra Info Display the link status Channel Display the number of the radio channel and the frequency used for the networking Link Speed Mbps Display the transmissio...

Страница 25: ...ignal been received by the card This indicator helps to find the proper position of the wireless device for quality network operation Noise Level Display the noise level in the wireless environment 3...

Страница 26: ...n the network you can set the card to this mode 802 11 G only This card can be compatible with both 802 11g and 802 11b wireless stations If there are only 802 11g wireless stations in the network you...

Страница 27: ...you can select Tx BURST Tx Burst enables the card to deliver the better throughput in the same period and environment This feature only takes effect when the connected AP also supports Tx Burst Enabl...

Страница 28: ...takes the place of the RADIUS server and authenticates the client so quickly that there is no perceptible delay in voice or other time sensitive applications Enable Radio Measurement When this parame...

Страница 29: ...ion you can click the hyperlink to connect the PLANET website You can also obtain basic information about the WML 8315 such as the Driver Utility and EEPROM Version The MAC Address of the card is disp...

Страница 30: ...xtensions for 802 11 networks will help to define the priorities of the data traffics by the data categories to provide enhanced multimedia support When the WML 8315 is connected to the AP or Router w...

Страница 31: ...D Select Advanced page enable the WMM Capable 27...

Страница 32: ...on when B mode station and G mode station exist concurrently CAM when AC power When use AC power it doesn t enter into sleep mode Country Region 11A Not applicable on WML 8315 Country Region 11G Suppo...

Страница 33: ...ection mechanism called RTS CTS that governs how 802 11g devices and 802 11b devices interoperate 2 What is MIMO MIMO multiple input multiple output a technique for boosting wireless bandwidth and ran...

Страница 34: ...highest degree of security and authenticity for digital information wherever and however communicated or stored while making more efficient use of hardware and or software than previous encryption sta...

Страница 35: ...eivers 14 What is Spread Spectrum Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable secure mission critical communication systems It is d...

Отзывы: