which contains the issuer’s public key, into the trusted root certication
authority certicate store of t he host computer. Intermediate or
subordinate certication authori ties are trusted only if they have a
valid certication path from a tr usted root certication authority.
Server Name: Enter the authentication ser ver name.
Server name must match exa ctly: When selected, the server name
must exactly match the server name found on the cert icate.
Domain name must end in speci ed name: When this is selected,
the server name eld identies a domain. The cer ticate must use a
server name belonging to this domain or one of its sub-domains (e.g.,
zeelans.com, where the server is blueberry.zeelans.co m), but it may
be any name used in the certicate name eld.
STATISTIcS
This screen enables you to view/compare the transmit and receive
statistical information of the connectio n. To reset the counters, click
”Reset Counter.”
ADvANCED
This screen enables you to congure more advanced set tings, such as
the wireless mode and the protection mode.
Wireless Mode: Select from the drop -down menu.
• 802.11 B/G mix: If you have a mix of 802.11b and 802.11g wireless
stations in your network, it is recommended that the a dapter be set
18
CONFIGURATION