3.Click the Configure button.

4.Select the appropriate network certificate authority from the drop-down list.

5.Enter a PEAP user name in the User Name field to use a separate user name and start the PEAP authentication process.

6.Choose Token or Static Password, depending on the user database.

Note that Token uses a hardware token device or the Secure Computing SofToken program (version 1.3 or later) to obtain and enter a one-time password during authentication.

7.Click Advanced and:

oLeave the server name field blank for the client to accept a certificate from any server with a certificate signed by the authority listed in the Network Certificate Authority drop-down list. (recommended)

oEnter the domain name of the server from which the client will accept a certificate.

oThe login name used for PEAP tunnel authentication, fills in automatically as PEAP-xxxxxxxxxxxx, where xxxxxxxxxxxx is the computer's MAC address. Change the login name if needed.

8.Click OK.9.Enable the profile.Using PEAP-MSCHAP V2 Security

To use PEAP (EAP-MSCHAP V2) security, the server must have WPA-PEAP certificates, and the server properties must already be set. Check with the IT manager.

1.On the Security tab, choose the WPA radio button.

OR: On the Security tab, choose the 802.1x radio button.

2.Choose PEAP (EAP-MSCHAP V2) from the drop-down menu.

19