Wireless N Adapter RNX-N250UB User Manual
Figure 4-26
Use certificate chain: Place a check in this to enable the certificate use.
Certificate issuer: Select the Certification Authority from the drop-down list.
Allow intermediate certificates: During tunnel creation the client must verify
the server’s certificate. When checking this certificate the signature
is verified against a list of trusted certificate authorities. If this parameter is
true then the client will also accept a signature from a trusted intermediate
certificate authority, otherwise it will not.
Server name: Enter the server name if not selected from the existing drop-down
list above.
Click on the OK button to save the changes.
4.2.1 Profiles
The Profile tab is used to store the settings of multiple Access Points such as home, office,
café, etc. When adding a profile you are required to enter a profile name and SSID as well as
configure the power-saving mode, network type, RTS/fragmentation threshold and
encryption/authentication settings. A profile can be configured as Infrastructure or
Ad-hoc mode. The configuration settings for each mode are described below.
46