Key

Description

Available Values

 

 

 

 

 

 

 

Available EAP methods for IEEE 802.1X and

• LEAP

 

WPA(2)-Enterprise (EAP) association modes.

PEAPv0-MSCHAPV2

 

 

PEAPv1-MSCHAPV2

 

 

PEAPv1-GTC

 

 

PEAPv1-TLS

EAP Method

 

FAST-MSCHAPV2

 

FAST-GTC

 

 

 

 

FAST-TLS

 

 

• TLS

 

 

TTLS-MD5

 

 

TTLS-MSCHAPV2

 

 

TTLS-GTC

 

 

 

PSK

Enter the private share key for the WEP

User-defined

association mode.

 

 

 

 

 

 

 

This is the 802.1X identity supplied to the

User-defined

Identity

authenticator. The identity value can be up to 63

 

 

ASCII characters and is case-sensitive.

 

 

 

 

 

This is the password used for MD5-Challenge or

User-defined

 

LEAP authentication. It may contain up to 63

 

Password

ASCII characters and is case-sensitive. Asterisks

 

 

appear instead of characters for enhanced

 

 

security.

 

 

 

 

 

Enter the anonymous ID. This ID creates a tunnel

User-defined

 

through which the real ID (as entered in the

 

Anonymous ID

Identity field) can pass.

 

 

For additional security, make this ID different than

 

 

the one entered in the Identity field.

 

 

 

 

 

For EAP-FAST, a one-time provisioning

Enter the address on the

Tunnel PAC

exchange establishes a shared secret, called a

Dolphin terminal of either PAC

Protected Access Credential (PAC) Key. That

(tunnel or machine).

Machine PAC

PAC Key is used for all subsequent

Note: The PACs must be

 

authentications.

located on the Dolphin

 

 

terminal!

 

 

 

 

Provisioning refers to service activation and

• No Provisioning

Provisioning

involves programming various network

• Anonymous

databases with the customer's information.

• Authenticated

 

 

 

• Anonymous + Authenticated

 

 

 

 

CA certificates are any certificates created by a

Enter the address on the

 

certified authority (CA).

Dolphin terminal of either

CA and/or Client

Client certificates contain information that

certificate (CA or Client).

Certificate

identifies the user, as well as information about

 

 

the organization that issued the certificate. This

The certificates must be located

 

ensures that you can encrypt data end-to-end.

on the Dolphin terminal!

 

 

 

 

Private keys are used with certain types of EAP

Enter the address on the

 

authentication.

Dolphin terminal of the private

Private Key

 

key.

 

 

The private key must be located

 

 

on the Dolphin terminal!

 

 

 

7 - 4