
Key | Description | Available Values | |
|
|
| |
|
|
| |
| Available EAP methods for IEEE 802.1X and | • LEAP | |
| • | ||
|
| • | |
|
| • | |
|
| • | |
EAP Method |
| • | |
| • | ||
|
| ||
|
| • | |
|
| • TLS | |
|
| • | |
|
| • | |
|
| • | |
|
|
| |
PSK | Enter the private share key for the WEP | ||
association mode. |
| ||
|
| ||
|
|
| |
| This is the 802.1X identity supplied to the | ||
Identity | authenticator. The identity value can be up to 63 |
| |
| ASCII characters and is |
| |
|
|
| |
| This is the password used for | ||
| LEAP authentication. It may contain up to 63 |
| |
Password | ASCII characters and is |
| |
| appear instead of characters for enhanced |
| |
| security. |
| |
|
|
| |
| Enter the anonymous ID. This ID creates a tunnel | ||
| through which the real ID (as entered in the |
| |
Anonymous ID | Identity field) can pass. |
| |
| For additional security, make this ID different than |
| |
| the one entered in the Identity field. |
| |
|
|
| |
| For | Enter the address on the | |
Tunnel PAC | exchange establishes a shared secret, called a | Dolphin terminal of either PAC | |
Protected Access Credential (PAC) Key. That | (tunnel or machine). | ||
Machine PAC | PAC Key is used for all subsequent | Note: The PACs must be | |
| authentications. | located on the Dolphin | |
|
| terminal! | |
|
|
| |
| Provisioning refers to service activation and | • No Provisioning | |
Provisioning | involves programming various network | • Anonymous | |
databases with the customer's information. | • Authenticated | ||
| |||
|
| • Anonymous + Authenticated | |
|
|
| |
| CA certificates are any certificates created by a | Enter the address on the | |
| certified authority (CA). | Dolphin terminal of either | |
CA and/or Client | Client certificates contain information that | certificate (CA or Client). | |
Certificate | identifies the user, as well as information about |
| |
| the organization that issued the certificate. This | The certificates must be located | |
| ensures that you can encrypt data | on the Dolphin terminal! | |
|
|
| |
| Private keys are used with certain types of EAP | Enter the address on the | |
| authentication. | Dolphin terminal of the private | |
Private Key |
| key. | |
|
| The private key must be located | |
|
| on the Dolphin terminal! | |
|
|
|
7 - 4