Selecting the Device Certificate
Select the certificate you want to use under IEEE 802.1X from among the device certificates created and
installed in advance on the machine. For details about creating and installing a device certificate, see
page 81 "Protecting Communication Paths via a Device Certificate".
1.
Log in as the network administrator from Web Image Monitor.
2.
Point to [Device Management], and then click [Configuration].
3.
Click [Device Certificate] under "Security".
4.
Select the certificate to be used for IEEE 802.1X from the drop-down box in "IEEE 802.1X"
under "Certification".
5.
Click [OK].
6.
"Updating..." appears. Wait for about 1 or 2 minutes, and then click [OK].
If the previous screen does not appear again after you click [OK], wait for a while, and then click
the web browser's refresh button.
7.
Log out.
Setting Items of IEEE 802.1X for Ethernet
1.
Log in as the network administrator from Web Image Monitor.
2.
Point to [Device Management], and then click [Configuration].
3.
Click [IEEE 802.1X] under "Security".
4.
In "User Name", enter the user name set in the RADIUS server.
5.
Enter the domain name in "Domain Name".
6.
Select "EAP Type". Configurations differ according to the EAP Type.
EAP-TLS
• Make the following settings according to the operating system you are using:
• Select [On] or [Off] in "Authenticate Server Certificate".
• Select [On] or [Off] in "Trust Intermediate Certificate Authority".
• Enter the host name of the RADIUS server on "Server ID".
• Select [On] or [Off] in "Permit Sub-domain".
LEAP
• Click [Change] in "Password", and then enter the password set in the RADIUS server.
EAP-TTLS
• Click [Change] in "Password", and then enter the password set in the RADIUS server.
Configuring IEEE 802.1X Authentication
109
Содержание PRO C9100
Страница 2: ......
Страница 8: ...List of Operation Privileges for Address Books 229 INDEX 231 6...
Страница 24: ...1 Getting Started 22...
Страница 72: ...4 Preventing Leakage of Information from Machines 70...
Страница 116: ...5 Enhanced Network Security 114...
Страница 176: ...6 Managing the Machine 174...
Страница 188: ...7 Troubleshooting 186...
Страница 218: ...System Log Settings User Mach N W File Unset Set System Log R R R R R 8 List of Operation Privileges for Settings 216...
Страница 220: ...Settings User Mach N W File Unset Set Device Access Violation R W 8 List of Operation Privileges for Settings 218...
Страница 235: ......
Страница 236: ...EN GB EN US EN AU M238 1022 2014...