Motorola VC5090 Specifications Page 103

  • Download
  • Add to my manuals
  • Print
  • Page
    / 258
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 102
Wireless Applications 4 - 9
Figure 4-8 Authentication Dialog Box
Tunneled Authentication
Use the Tunneled Authentication dialog box to select the tunneled authentication options. There are different
selections available for PEAP or TTLS authentication.
Figure 4-9 Tunneled Authentication Dialog Box
To select a tunneled authentication type:
1. Select a tunneled authentication type from the drop-down list. See Table 4-8 and Table 4-9.
2. Select the User Certificate check box if a certificate is required. If you selected the TLS tunnel type that requires
a user certificate, the check box is already selected.
3. Tap Next. The Installed User Certificates dialog box appears.
Table 4-7 Authentication Options
Authentication Description
None Default setting when authentication is not required on the network.
EAP-TLS Select this option to enable EAP-TLS authentication. EAP-TLS is an authentication scheme
through IEEE 802.1x. It authenticates users and ensures only valid users can connect to the
network. It also restricts unauthorized users from accessing transmitted information by using
secure authentication certificates.
PEAP Select this option to enable PEAP authentication. This method uses a digital certificate to
verify and authenticate a user's identity.
LEAP Select this option to enable LEAP authentication, which is based on mutual authentication.
The AP and the connecting mobile computer require authentication before gaining access to
the network.
TTLS Select this option to enable TTLS authentication.
Page view 102
1 2 ... 98 99 100 101 102 103 104 105 106 107 108 ... 257 258

Comments to this Manuals

No comments