|
| Chapter 15 System |
| Table 81 Configuration > System > Auth. Server (continued) | |
| LABEL | DESCRIPTION |
| Secret | Enter a password (up to 31 alphanumeric characters, no spaces) as the |
|
| key for encrypting communications between the |
|
| and this entry’s AP. The key is not sent over the network. This key must |
|
| be the same on the |
|
| Both the |
|
| also be configured in the “external RADIUS” server fields of the trusted |
|
| AP. |
|
|
|
| Description | Type some information to help identify the trusted AP. |
|
|
|
| OK | Click OK to save your changes back to the |
|
|
|
| Cancel | Click Cancel to exit this screen without saving your changes. |
|
|
|
15.11 Technical Reference
This section provides some technical background information about the topics covered in this chapter.
Internal RADIUS Server
PEAP (Protected EAP) and MD5 authentication is implemented on the internal RADIUS server using simple username and password methods over a secure TLS connection. See Appendix C on page 319 for more information on the types of EAP authentication and the internal RADIUS authentication method used in your
Note: The internal RADIUS server does not support domain accounts (DOMAIN/ user). When you configure your Windows XP SP2 Wireless Zero Configuration
| 225 |
|
|