Authentication Protocol
Type | RADIUS | User ID & | Certificate | Private Key |
| |
|
| Server | Password |
| Info File | |
|
| Protocol |
|
|
|
|
|
|
|
|
|
|
|
Enterprise | LEAP |
|
| No | N/A |
|
| PEAP* |
|
|
| N/A |
|
| TLS | PAP or | Required | Optional* | Required* | |
|
| MSCHAPv2 |
|
|
| |
| TTLS |
|
| N/A |
| |
|
|
|
| |||
| EAP- |
|
| PAC* | N/A | |
| FAST |
|
|
|
|
|
Personal | PSK | N/A |
|
|
|
|
*PEAP | This is only for |
|
|
| ||
*Optional | Leaving the Certificate Root Key and the Certificate CN (common) names blank, no | |||||
| validation of the host certificate is performed. The values are set to “null” and all host | |||||
| certificates are accepted. |
|
|
|
| |
*Required | The Print Server comes with a default Private Key Information File. You can either | |||||
| download that file from the print server and add it to the TLS authentication server, or | |||||
| overwrite a new one on the print server. |
|
|
| ||
*PAC | ||||||
| Credential), which is managed dynamically by the server. The PAC is distributed one at a | |||||
| time to the client manually or automatically. |
|
|
|
See the following table of acceptable combinations:
| Encryption |
| |
Authentication | WEP | WPA, WPA (TKIP), WPA2 | |
Open | Static | No | |
Shared | |||
|
| ||
PSK |
|
| |
|
|
| |
LEAP |
|
| |
PEAP | Dynamic | Yes | |
|
| ||
|
|
| |
TLS* |
|
| |
TTLS |
|
| |
|
|
|
*Load the local key before enabling TLS.