Tunneled authentication, Tunneled authentication -9, Table 4-7 – Motorola VC5090 User Manual

Page 103

Advertising
background image

Wireless Applications

4 - 9

Figure 4-8 Authentication Dialog Box

Tunneled Authentication

Use the

Tunneled Authentication

dialog box to select the tunneled authentication options. There are different

selections available for PEAP or TTLS authentication.

Figure 4-9 Tunneled Authentication Dialog Box

To select a tunneled authentication type:

1.

Select a tunneled authentication type from the drop-down list. See

Table 4-8

and

Table 4-9

.

2.

Select the

User Certificate

check box if a certificate is required. If you selected the TLS tunnel type that requires

a user certificate, the check box is already selected.

3.

Tap

Next

. The

Installed User Certificates

dialog box appears.

Table 4-7 Authentication Options

Authentication

Description

None

Default setting when authentication is not required on the network.

EAP-TLS

Select this option to enable EAP-TLS authentication. EAP-TLS is an authentication scheme
through IEEE 802.1x. It authenticates users and ensures only valid users can connect to the
network. It also restricts unauthorized users from accessing transmitted information by using
secure authentication certificates.

PEAP

Select this option to enable PEAP authentication. This method uses a digital certificate to
verify and authenticate a user's identity.

LEAP

Select this option to enable LEAP authentication, which is based on mutual authentication.
The AP and the connecting mobile computer require authentication before gaining access to
the network.

TTLS

Select this option to enable TTLS authentication.

Advertising