From the Security Settings page you can enter the required security settings for the selected wireless network. See Personal Security to set basic WEP or WPA security in a non-enterprise environment (home, small business). See Enterprise Security Settings to set up 802.1X security authentication options.
| Name | Setting |
|---|---|
Enterprise Security |
Select to open the Enterprise Security settings. The security settings that are available are dependent on the Operating Mode selected: Device to Device (ad hoc) or Network (Infrastructure). |
Network Authentication |
If you configure a profile for Device to Device (ad hoc) networking, the default setting is Open authentication. If you configure a profile for an infrastructure network, select:
NOTE: WPA-Enterprise and WPA2-Enterprise are interoperable. |
Data Encryption |
Click to open the following data encryption types:
|
Enable 802.1X (Authentication Type) |
Click to open the following 802.1X authentication types:
Certain Authentication Types require that you obtain and install a client certificate. See Set up a Client with TLS authentication or consult your administrator. |
| Authentication Protocols | Authentication Protocols apply only when Network Authentication is set to WPA-Enterprise or WPA2-Enterprise and Authentication Type is set to TTLS or PEAP. |
Click to view the Cisco Compatible Extensions Options. NOTE: Cisco Compatible Extensions are automatically enabled for CKIP and LEAP profiles. |
|
Advanced |
Click to access the Advanced Settings and configure the following options listed.
|
User Credentials |
A profile configured for TTLS, PEAP, or EAP-FAST authentication requires one of the following log on authentication methods:
NOTE: For LEAP profiles, this option is listed as Use Windows logon user name and password.
NOTE: For LEAP profiles, this option is listed as Prompt for the user name and password.
NOTE: Contact your administrator to obtain the domain name. NOTE: For LEAP profiles, this option is listed as Use the following user name and password. |
Server Options |
Select one of the following credential retrieval methods: Certificate Issuer: The server certificate received during TLS message exchange must be issued by this certificate authority (CA). Trusted intermediate certificate authorities and root authorities whose certificates exist in the system store are available for selection. If Any Trusted CA is selected, any CA in the list is acceptable. Click Any Trusted CA as the default or select a certificate issuer from the list. The server name or domain to which the server belongs, depends on which of the following options has been selected.
NOTE: These parameters should be obtained from the administrator. |
| Certificate Options | To obtain a certificate for TLS authentication, select one of the following:
NOTE: The Intel(R) PROSet/Wireless WiFi Connection Utility supports machine certificates. However, they are not displayed in the certificate listings. Notes about Certificates: The specified identity should match the Issued to identity in the certificate and should be registered on the authentication server (for example, RADIUS server) that is used by the authenticator. Your certificate must be valid with respect to the authentication server. This requirement depends on the authentication server and generally means that the authentication server must know the issuer of your certificate as a Certificate Authority. Use the same user name you used to log in when the certificate was installed. |
Back |
View the prior page in the Profile Wizard. |
Next |
View the next page in the Profile Wizard. If more security information is required then the next step of the Security Settings is displayed. |
OK |
Closes the Profile Wizard and saves the profile. |
Cancel |
Closes the Profile Wizard and cancels any changes made. |
Help? |
Provides the help information for the current page. |