Appendix C: Security Settings On Wireless Clients And RADIUS Server Setup
IEEE 802.1x Client Using EAP/PEAP
C-14
Psion Teklogix 9160 G2 Wireless Gateway User Manual
1. Configure the following settings on the Association tab on the Network
Properties dialog.
2. Configure this setting on the Authentication tab.
3. Click Properties to bring up the Protected EAP Properties dialog and
configure the following settings.
4. Click Configure to bring up the EAP MSCHAP v2 Properties dialog.
On this dialog, disable (click to uncheck) the option to Automatically use
my Windows logon name . . . etc.
Click OK on all dialogs (starting with the EAP MSCHAP v2 Properties
dialog) to close and save your changes.
Network Authentication
Open
Data Encryption
WEP
Note: An RC4 stream cipher is used to encrypt the frame body and cyclic redun-
dancy checking (CRC) of each IEEE 802.11 frame. This is the same encryp-
tion algorithm as is used for Static WEP; therefore, the data encryption
method configured on the client for this mode is WEP.
This key is provided for
me automatically
Enable
(click to check) this option.
Table C.4 Association Settings
EAP Type
Choose
Protected EAP (PEAP)
.
Table C.5 Authentication Settings
Validate Server Certificate
Disable
this option (click to uncheck the box).
Note: This example assumes you are using the Built-in Authentication
server on the AP. If you are setting up EAP/PEAP on a client of an
AP that is using an external RADIUS server, you might certificate
validation and choose a certificate, depending on your infrastructure.
Select Authentication Method
Choose
Secured password (EAP-MSCHAP v2)
.
Table C.6 Protected EAP Properties Settings