Certificate Options
To obtain a certificate for TLS authentication, select one of the
following:
Use my smart card:
Select if the certificate resides on a smart
card.
Use the certificate issued to this computer:
Selects a
certificate that resides in the machine store.
Use a user certificate on this computer:
Click
Select
to choose
a certificate that resides on this computer.
NOTE:
Intel PROSet/Wireless supports machine certificates.
However, they are not displayed in the certificate listings.
Notes about Certificates:
The specified identity should match
the
Issued to
identity in the certificate and should be registered
on the authentication server (for example, RADIUS server) that is
used by the authenticator. Your certificate must be valid with
respect to the authentication server. This requirement depends on
the authentication server and generally means that the
authentication server must know the issuer of your certificate as a
Certificate Authority. Use the same user name you used to log in
when the certificate was installed.
Back
View the prior page in the Create Wireless Profile manager.
Next
View the next page in the Create Wireless Profile manager. If more
security information is required then the next Step of the Security
page is displayed.
OK
Closes the Create Wireless Profile manager and saves the profile.
Cancel
Closes the Create Wireless Profile manager and cancels any
changes made.
Help?
Provides the help information for the current page.
Configure Profiles for Infrastructure Networks
An infrastructure network consists of one or more access points and one or more computers with wireless
adapters installed. Each access point must have a wired connection to a wireless network.
Set up a Client with WPA-Enterprise or WPA2-Enterprise Network Authentication
WPA2-Enterprise requires an authentication server.
●
WPA-Enterprise:
A wireless security method that provides strong data protection for multiple users and
large managed networks. It uses the 802.1X authentication framework with TKIP encryption and
prevents unauthorized network access by verifying network users through an authentication server.
●
WPA2-Enterprise:
The follow-on wireless security method to WPA that provides stronger data
protection for multiple users and large managed networks. It prevents unauthorized network access by
verifying network users through an authentication server.
NOTE:
WPA-Enterprise and WPA2-Enterprise are not interoperable.
To add a profile that uses WPA-Enterprise or WPA2-Enterprise authentication:
1. Obtain a user name and password on the RADIUS server from your administrator.
2. Certain Authentication Types require that obtain and install a client certificate. See
Summary of Contents for Wireless WiFi Link 4965AGN
Page 31: ...Back to Top Back to Contents Trademarks and Disclaimers ...
Page 36: ...Back to Top Back to Contents Trademarks and Disclaimers ...
Page 144: ...Back to Contents Trademarks and Disclaimers ...
Page 152: ...Back to Top Back to Contents Trademarks and Disclaimers ...
Page 174: ......
Page 175: ......
Page 183: ......