Wistron Corporation MS2140BG Manual De Usuario

Descargar
Página de 84
●     
If you know the server name enter this name. 
●     
Select the appropriate option to match the server name exactly or specify the 
domain name. 
14.  Use Client Certificate: This option selects a client certificate from the Personal 
certificate store of the Windows logged-in user. This certificate will be used for 
client authentication. Click the Select button to open a list of installed certificates. 
●     
Note about Certificates: The specified identity should match the field "Issued 
to" in the certificate and should be registered on the authentication server 
(i.e., RADIUS server) that is used by the authenticator. Your certificate must 
be "valid" with respect to the authentication server. This requirement 
depends on the authentication server and generally means that the 
authentication server must know the issuer of your certificate as a Certificate 
Authority. You should be logged in using the same username you used when 
the certificate was installed. 
15.  Select the certificate from the list and click OK. The client certificate information 
displays under "Client Certificate". 
16.  Click Close
17.  Click the Finish button to save the security settings for the profile. 
  
Setting up the Client for WPA using TKIP encryption and TTLS or 
PEAP authentication
Using TTLS authentication: These settings define the protocol and the credentials used 
to authenticate a user. In TTLS, the client uses EAP-TLS to validate the server and 
create a TLS-encrypted channel between the client and server. The client can use 
another authentication protocol, typically password-based protocols, such as MD5 
Challenge over this encrypted channel to enable server validation. The challenge and 
response packets are sent over a non-exposed TLS encrypted channel.
Using PEAP authentication: PEAP settings are required for the authentication of the 
client to the authentication server. In PEAP, the client uses EAP-TLS to validate the 
server and create a TLS-encrypted channel between client and server. The client can 
use another EAP mechanism, such as Microsoft Challenge Authentication Protocol 
(MSCHAP) Version 2, over this encrypted channel to enable server validation. The 
challenge and response packets are sent over a non-exposed TLS encrypted channel.