Protected Setup Pages

EAP-PEAP security is designed for wireless environments where it is necessary to transmit data securely over a wireless network.

EAP-PEAP Settings

SSID (Service Set Identifier):

Opens an on-screen keyboard to enter the SSID name used on the target

 

WAP. The SSID is a unique name used by the WAP, and is assigned to all

 

panels on that network. An SSID is required by the WAP before the panel is

 

permitted to join the network.

 

• The SSID is case sensitive and must not exceed 32 characters.

 

• Make sure this setting is the same for all points in the wireless network.

 

NXA-WAP200Gs use AMX as their default SSID.

 

• With EAP security, the SSID of the WAP must be entered. If it is left blank,

 

the panel will try to connect to the first access point detected that supports

 

EAP. However, a successful connection is not guaranteed because the

 

detected WAP may be connected to a RADIUS server, which may not

 

support this EAP type and/or have the proper user identities configured.

 

 

Identity:

Opens an on-screen keyboard to enter an EAP Identity string (used by the

 

panel to identify itself to an Authentication (RADIUS) Server).

 

Note: This information is similar to a username used to login to a secured

 

server or workstation. This works in tandem with the Password string, which

 

is similar to the password entered to gain access to a secured workstation.

 

Typically, this is in the form of a username such as jdoe@amx.com.

 

 

Password:

Opens an on-screen keyboard to enter the network password string specified

 

for the user entered within the Identity field (used by the panel to identify itself

 

to an Authentication (RADIUS) Server)

 

Note: This information is similar to the password entered to gain access to a

 

secured workstation.

 

 

Certificate Authority:

When pressed, the panel displays an on-screen Certificate Authority (CA)

 

File Location keyboard, which allows you to enter the name of the certificate

 

authority file which is used to validate the server certificate.This field is

 

optional.

 

If a server certificate is used, it should first be downloaded into the panel and

 

the Certificate Authority field should then be set to the name of that certificate

 

file. No file path should be used for this setting as all certificates are stored in

 

a specific directory that the user cannot control or change.

 

Use the on-screen keyboard’s Clear button to erase completely any

 

previously stored network path information.

 

 

PEAP Version:

When pressed, this field cycles through the choices of available PEAP:

 

PEAPv0, PEAPv1, or PEAPv1 w/peaplabel=1.

 

 

Inner Authentication Type:

When pressed, this field cycles through the choices of available Inner

 

Authentication mechanisms supported by the Devicescape Secure Wireless

 

Client. The most commonly used are: MSCHAPv2 and GTC.

 

• MSCHAPv2 (used with PEAPv0)

 

• GTC (used with PEAPv1)

 

• OTP

 

• MD5

 

 

Save/Cancel:

Save - store the new security information, apply changes, and return to the

 

previous page.

 

Cancel - discard changes and return to the previous page.

 

 

Refer to the EAP Authentication section on page 166 and the Using the Site Survey tool section on page 23 for further details on these security options.

78

MVP-5200i Modero Viewpoint Widescreen Touch Panel

Page 86
Image 86
AMX MVP-5200i manual EAP-PEAP Settings, Certificate Authority, Peap Version, PEAPv0, PEAPv1, or PEAPv1 w/peaplabel=1