Sign-On vs. Stored Credentials
When using wireless security that requires a user name and password to be entered, the Summit Client Utility offers these
choices:
l
The Username and Password may be entered on the Credentials screen. If this method is selected, anyone using the
device can access the network.
l
The Username and Password are left blank on the Credentials screen. When the device attempts to connect to the
network, a sign on screen is displayed. The user must enter the Username and Password at that time to authenticate.
How to: Use Stored Credentials
1. After completing the other entries in the profile, click on the
Credentials
button.
2. Enter the Username and Password on the Credentials screen and click
the OK
button.
3. Click the
Commit
button.
4. For LEAP and WPA/LEAP, configuration is complete.
5. For PEAP-MSCHAP and PEAP-GTC, importing the CA certificate into the Windows certificate store is optional.
6. For EAP-TLS, import the CA certificate into the Windows certificate store. Also import the User Certificate into the
Windows certificate store.
7. Access the Credentials screen again. Make sure the
Validate server
and
Use MS store
checkboxes are checked.
8. The default is to use the entire certificate store for the CA certificate. Alternatively, use the
Browse
button next to the
CA Cert (CA Certificate Filename) on the Credentials screen to select an individual certificate.
9. For EAP-TLS, also enter the User Cert (User Certificate filename) on the credentials screen by using the
Browse
button.
10. If using EAP FAST and manual PAC provisioning, input the PAC filename and password..
11. Click the
OK
button then the
Commit
button.
12. If changes are made to the stored credentials, click
Commit
to save those changes before making any additional
changes to the profile or global parameters.
13. Verify the device is authenticated by reviewing the Status tab. When the device is property configured, the Status tab
indicates the device is Authenticated and the method used.
Note:
See
for more details.
Note:
If invalid credentials are entered into the stored credentials, the authentication will fail. No error message is displayed
and the user is not prompted to enter valid credentials.
8-19
Summary of Contents for MX7 Tecton
Page 14: ...xiv ...
Page 24: ...1 10 ...
Page 38: ...3 4 ...
Page 166: ...Hat Encoding Hat Encoded Characters Hex 00 through AD 4 128 ...
Page 167: ...Hat Encoded Characters Hex AE through FF 4 129 ...
Page 176: ...4 138 ...
Page 177: ...4 139 ...
Page 202: ...Enter user name password and domain to be used when logging into network resources 4 164 ...
Page 209: ...4 171 ...
Page 240: ...5 22 ...
Page 276: ...7 30 ...
Page 320: ...8 44 ...
Page 325: ...Click the Request a certificate link Click on the advanced certificate request link 8 49 ...
Page 326: ...Click on the Create and submit a request to this CA link 8 50 ...
Page 334: ...8 58 ...
Page 358: ...9 24 ...
Page 362: ...10 4 ...
Page 365: ...11 3 ...