160 | |
|
|
1.Configure the following settings on the Association tab on the Network Properties dialog.
Association Tab
Field | Setting |
Network Authentication | Open |
|
|
Data Encryption | WEP |
| Note: An RC4 stream cipher is used to encrypt the frame body and |
| cyclic redundancy checking (CRC) of each IEEE 802.11 frame. This is |
| the same encryption algorithm as is used for Static WEP; therefore, |
| the data encryption method configured on the client for this mode is |
| WEP. |
|
|
This key is provided for me | Enable (click to check) this option. |
automatically |
|
|
|
2.Configure this setting on the Authentication tab.
Authentication Tab
FieldSetting
EAP Tye | Choose "Protected EAP (PEAP)". |
3.Click Properties to bring up the Protected EAP Properties dialog and configure the following settings.
|
| Authentication Tab |
|
|
|
Field |
| Setting |
Validate Server |
| Disable this option (click to uncheck the box). |
Certificate |
| Note: This example assumes you are using the |
|
| |
|
| server on the AP. If you are setting up EAP/PEAP on a client of an AP that |
|
| is using an external RADIUS server, you might certificate validation and |
|
| choose a certificate, depending on your infrastructure. |
|
|
|
Select Authentication |
| Choose "Secured password |
Method |
|
|
|
|
|
4.Click Configure to bring up the EAP MSCHAP v2 Properties dialog.
On this dialog, disable (click to uncheck) the option to "Automatically use my Windows login name
. . ." etc.
Click OK on all dialogs (starting with the EAP MSCHAP v2 Properties dialog) to close and save your changes.