Firmware Pages and Descriptions

Wireless Security - EAP-PEAP (Cont.)

Identity:

When pressed, the panel displays an on-screen keyboard which allows you

 

to enter an EAP Identity string which is how the panel identifies itself to the

 

Authentication (RADIUS) Server.

 

• This information is similar to a username used to login to a secured server

 

or workstation. This works in tandem with the Password string which is

 

similar to the password entered to gain access to a secured workstation.

 

Note: Typically, this is in the form of a username such as: jdoe@amx.com

 

• Use the on-screen keyboard’s Clear button to completely erase any

 

previously stored identity/username information.

 

 

Password:

When pressed, the panel displays an on-screen keyboard which allows you

 

to enter the network password string specified for the user entered within the

 

Identity field. This is also how the panel identifies itself to the Authentication

 

(RADIUS) Server.

 

• This information is similar to the password entered to gain access to a

 

secured workstation.

 

• Use the on-screen keyboard’s Clear button to completely erase any

 

previously stored passwords.

 

 

Certificate Authority:

When pressed, the panel displays an on-screen Certificate Authority (CA)

 

File Location keyboard which allows you to enter the name of the certificate

 

authority file which is used to validate the server certificate.

 

This field is optional.

 

If a server certificate is used, it should first be downloaded into the panel and

 

the Certificate Authority field should then be set to the name of that certificate

 

file. No file path should be used for this setting as all certificates are stored in

 

a specific directory that the user cannot control or change.

 

• Use the on-screen keyboard’s Clear button to completely erase any

 

previously stored network path information.

 

 

PEAP Version:

When pressed, this field cycles through the choices of available PEAP:

 

PEAPv0, PEAPv1, or PEAPv1 w/peaplabel=1.

 

 

Inner Authentication Type:

When pressed, this field cycles through the choices of available Inner

 

Authentication mechanisms supported by the Devicescape Secure Wireless

 

Client. The most commonly used are: MSCHAPv2 and GTC.

 

• MSCHAPv2 (used with PEAPv0)

 

• TLS

 

• GTC (used with PEAPv1)

 

• OTP

 

MD5-Challenge

 

 

Save/Cancel:

• Use the Save button to store the new security information, incorporate it,

 

and then return to the previous Wireless Settings page.

 

• Use the Cancel button to cancel any updates to the security parameters

 

and return to the previous Wireless Settings page.

 

 

Wireless Settings Page - Security Options - EAP-TTLS

EAP (Extensible Authentication Protocol) is a Enterprise authentication protocol that can be used in both a wired and wireless network environment. EAP requires the use of an 802.1x Authentication Server, also known as a Radius server. Most of the configuration fields described below take variable length strings as inputs. Whenever these fields are selected, an on-screen keyboard appears which allows the string to then be entered.

126

7" Modero Widescreen Touch Panels

Page 136
Image 136
AMX CV7 manual Wireless Settings Page Security Options EAP-TTLS, Wireless Security EAP-PEAP