Working with the M111

Using station profiles to establish a wireless link

When this option is enabled, this profile takes priority over profiles without active scanning. The M111 attempts to connect with active profiles first before trying other profiles in the list.

 

Wireless security

 

Wireless protection

 

The M111 supports several authentication and encryption options for protection of wireless

 

transmissions. To make use of these options, the remote AP to which the M111 connects

 

must be configured appropriately. The options displayed are dependent on the Wireless

 

protection option selected.

 

 

Note

Options that need support from a RADIUS server require that the connection to the RADIUS

 

server is configured on the remote AP and not on the M111.

 

The following wireless protection options are available:

 

None: No authentication.

802.1X: This option enables support for 802.1X with or without WEP. Must be used with a RADIUS server.

WPA: This option enables support for WPA with TKIP, supporting either a RADIUS server or a pre-shared key (PSK).

WPA2: This option enables support for WPA2 with AES/CCMP, supporting either a RADIUS server or a pre-shared key (PSK).

Key source

PSK: Only available if Wireless protection is set to WPA or WPA2.

Key: The M111 uses the key you specify in the this field to generate the TKIP or AES/CCMP keys that encrypt the wireless data stream. Since this is a static key, it is not as secure as the RADIUS option. Specify a key that is between 8 and 63 alphanumeric characters in length. It is recommended that the preshared key be at least 20 characters long, and be a mix of letters and numbers. The double quote character (") should not be used.

RADIUS: The M111 obtains the Microsoft Point-to-Point Encryption (MPPE) keys from a RADIUS server (via the remote AP). This is a dynamic key that changes each time the M111 logs in and is authenticated by the AP. The MPPE key is used to generate the WEP, TKIP or AES/CCMP keys that encrypt the wireless data stream.

EAP method

Select the Extensible Authentication Protocol (EAP) authentication method the M111 will use when connecting to the AP.

PEAP version 0 / PEAP version 1: These two options have the same configuration settings. PEAP version 0 only supports MS-CHAP V2 as the inner EAP protocol. PEAP version 1 only supports EAP-GTC (generic token card) as an inner EAP protocol. Both require the use of a RADIUS server by the remote AP.

3-16