3.Click the Configure button.

4.Select the appropriate certificate from the drop-down list.

5.Enter a PEAP user name in the User Name field to use a separate user name and start the PEAP authentication process.

6.Click Advanced and:

oLeave the server name field blank for the client to accept a certificate from any server with a certificate signed by the authority listed in the Network Certificate Authority drop-down list. (recommended)

oEnter the domain name of the server from which the client will accept a certificate.

oThe login name used for PEAP tunnel authentication, fills in automatically as PEAP-xxxxxxxxxxxx, where xxxxxxxxxxxx is the computer's MAC address. Change the login name if needed.

7.Click OK.

8.Enable the profile.

Using LEAP Security

LEAP security requires that all infrastructure devices (e.g. access points and servers) are configured for LEAP authentication. Check with the IT manager.

1.On the Security tab, choose the WPA radio button. Choose WPA-LEAP from the drop-down menu.

OR: On the Security tab, choose the 802.1x radio button. Choose LEAP from the drop-down menu.

20