Wireless Touch Panel with Intercom Reference Guide
Table Of Contents
- MVP-8400iModero® ViewPoint® Wireless Touch Panel with Intercom
- MVP-8400i Modero Viewpoint Wireless Touch Panel With Intercom
- MVP-BP Power Pack
- NXA-CFSP Compact Flash
- Wireless Interface Cards
- Configuring Communications
- Modero Setup and System Settings
- Wireless Settings Page - Wireless Access Overview
- Configuring a Wireless Network Access
- Step 1: Configure the Panel’s Wireless IP Settings
- Step 2: Configure the Card’s Wireless Security Settings
- Step 3: Choose a Master Connection Mode
- Using G4 Web Control to Interact with a G4 Panel
- Using your NetLinx Master to control the G4 panel
- Upgrading MVP Firmware
- Setup Pages
- Navigation Buttons
- Setup Pages
- Information
- Protected Setup Pages
- Protected Setup Navigation Buttons
- G4 Web Control Page
- Calibration Page
- Wireless Settings Page
- Wireless Security Page
- Open (Clear Text) Settings
- Static WEP Settings
- WPA-PSK Settings
- EAP-LEAP Settings
- EAP-FAST Settings
- EAP-PEAP Settings
- EAP-TTLS Settings
- EAP-TLS Settings
- Client certificate configuration
- System Settings Page
- Other Settings
- Tools
- Programming
- Panel Calibration
- Appendix A: Text Formatting
- Appendix B - Wireless Technology
- Appendix C: Troubleshooting
- Checking AMX USBLAN device connections via Windows Device Manager
- Checking AMX USBLAN device connections via NetLinx Studio
- USB Driver
- Panel Not in Listed As a Connected Device
- Connection Status
- Panel Doesn’t Respond To Touches
- Batteries Will Not Hold Or Take A Charge
- Modero Panel Isn’t Appearing In The Online Tree Tab
- MVP Can’t Obtain a DHCP Address
- My WEP Doesn’t Seem To Be Working
- NetLinx Studio Only Detects One Of My Connected Masters
- Can’t Connect To a NetLinx Master
- Only One Modero Panel In My System Shows Up
- Panel Behaves Strangely After Downloading A Panel File Or Firmware
- Panel Fails to Charge in MVP-WDS

Setup Pages
83
MVP-8400i Modero Viewpoint Wireless Touch Panels
Refer to the EAP Authentication section on page 173 for further details on these security
options.
Refer to the Using the Site Survey tool section on page 22 for more information on using this
feature.
EAP-TTLS Settings (Cont.)
Identity: Opens an on-screen keyboard. Enter an EAP Identity string (used by the
panel to identify itself to an Authentication (RADIUS) Server).
Note: This information is similar to a username used to login to a secured
server or workstation. This works in tandem with the Password string which is
similar to the password entered to gain access to a secured workstation.
Typically, this is in the form of a username such as: jdoe@amx.com.
Anonymous Identity: Opens an on-screen keyboard. Enter an IT provided alpha-numeric string
which (similar to the username) used as the identity, but that does not repre
-
sent a real user.
This information is used as a fictitious name which might be seen by sniffer
programs during the initial connection and setup process between the panel
and the Radius server. In this way the real identity (username) is protected.
Typically, this is in the form of a fictitious username such as:
anonymous@amx.com
Password: Opens an on-screen keyboard. Enter the network password string specified
for the user entered within the Identity field (used by the panel to identify itself
to an Authentication (RADIUS) Server)
Note: This information is similar to the password entered to gain access to a
secured workstation.
Certificate Authority: When pressed, the panel displays an on-screen Certificate Authority (CA)
File Location keyboard which allows you to enter the name of the certificate
authority file which is used to validate the server certificate.
This field is optional.
If a server certificate is used, it should first be downloaded into the panel and
the Certificate Authority field should then be set to the name of that certificate
file. No file path should be used for this setting as all certificates are stored in
a specific directory that the user cannot control or change.
• Use the on-screen keyboard’s Clear button to completely erase any
previously stored network path information.
Inner Authentication Type: When pressed, this field cycles through the choices of available Inner
Authentication mechanism supported by the Devicescape Secure Wireless
Client:
• MSCHAPv2 (default because its the most common)
• MSCHAP
•PAP
• CHAP
• EAP-MSCHAPv2
• EAP-GTC
• EAP-OTP
• EAP-MD5-Challenge
Save/Cancel: • Save - store the new security information, apply changes, and return to the
previous page.
• Cancel - discard changes and return to the previous page.










