User's Manual
Table Of Contents
- MVP-9000i9" Modero® ViewPoint®Touch Panel with Intercom
- Introduction
- Accessories
- Configuring Communication
- Overview
- IR Communication
- Modero Setup and System Settings
- Wireless Settings - Wireless Access Overview
- Configuring Wireless Network Access
- Step 1: Configure the Device’s WiFi Settings
- Step 2: Configure the Card’s Wireless Security Settings
- Step 3: Choose a Master Connection Mode
- Ethernet Over USB
- Using G4 Web Control to Interact with a G4 Panel
- Using the NetLinx Master To Control the G4 Panel
- Setup Pages
- Protected Setup Pages
- Upgrading Firmware
- Programming
- Overview
- Animated Transitions
- Touch Gesture Recognition
- Page Commands
- Programming Numbers
- "^" Button Commands
- Text Effects Names
- Button Query Commands
- Panel Runtime Operations
- Input Commands
- Embedded codes
- Panel Setup Commands
- Dynamic Image Commands
- Intercom Commands
- SIP Commands
- ^PHN- AUTOANSWER
- ^PHN-CALL
- ^PHN-INCOMING
- ^PHN- LINESTATE
- ^PHN- MSGWAITING
- ^PHN-PRIVACY
- ^PHN-REDIAL
- ^PHN- TRANSFERRED
- ^PHN-ANSWER
- ^PHN- AUTOANSWER
- ?PHN- AUTOANSWER
- ^PHN-CALL
- ^PHN-DTMF
- ^PHN-HANGUP
- ^PHN-HOLD
- ?PHN- LINESTATE
- ^PHN-PRIVACY
- ?PHN-PRIVACY
- ^PHN-REDIAL
- ^PHN- TRANSFER
- ^PHN-SETUP- DOMAIN
- ^PHN-SETUP- ENABLE
- ^PHN-SETUP- PASSWORD
- ^PHN-SETUP- PORT
- ^PHN-SETUP- PROXYADDR
- ^PHN-SETUP- STUNADDR
- ^PHN-SETUP- USERNAME
- Battery Life and Replacement
- Appendix A: Text Formatting
- Appendix B: Wireless Technology
- Appendix C: Troubleshooting
- Overview
- Panel Doesn’t Respond To Touches
- Battery Will Not Hold Or Take A Charge
- MVP-9000i Isn’t Appearing In The Online Tree Tab
- MVP Can’t Obtain a DHCP Address
- My WAP Doesn’t Seem To Be Working
- NetLinx Studio Only Detects One Of My Connected Masters
- Can’t Connect To a NetLinx Master
- Only One Modero Panel In My System Shows Up
- Panel Behaves Strangely After Downloading A Panel File Or Firmware
- Overview
Appendix B: Wireless Technology
182
MVP-9000i Modero® Wireless Touch Panel with Intercom
EAP Authentication
EAP (Extensible Authentication Protocol) is an Enterprise authentication protocol that can be used in both a
wired and wireless network environment. EAP requires the use of an 802.1x Authentication Server, also
known as a RADIUS server. Although over 40 different EAP methods are currently defined, the current
internal Modero 802.11a/b/g wireless card and accompanying firmware only support the following EAP
methods (listed from simplest to most complex):
EAP-LEAP (Cisco Light EAP)
EAP-FAST (Cisco Flexible Authentication via Secure Tunneling, a.k.a. LEAPv2)
The following use certificates:
EAP-PEAP (Protected EAP)
EAP-TTLS (Tunneled Transport Layer Security)
EAP-TLS (Transport Layer Security)
EAP requires the use of an 802.1x authentication server (also known as a RADIUS server). Sophisticated
Access Points (such as Cisco) can use a built-in RADIUS server. The most common RADIUS servers used in
wireless networks today are:
Microsoft Sever 2003
Juniper Odyssey (once called Funk Odyssey)
Meetinghouse AEGIS Server
DeviceScape RADIUS Server
Cisco Secure ACS
EAP Characteristics
The following table outlines the differences among the various EAP Methods from most secure (at the top of
the list) to the least secure (at the bottom of the list):
EAP Method Characteristics
Method: Credential Type: Authentication: Pros: Cons:
EAP-TLS • Certificates • Certificate is based on a
two-way authentication
• Highest
Security
• Difficult to
deploy
EAP-TTLS • Certificates
• Fixed Passwords
• One-time passwords
(tokens)
• Client authentication is
done via password and
certificates
• Server authentication is
done via certificates
• High Security • Moderately
difficult to
deploy
EAP-PEAP • Certificates
• Fixed Passwords
• One-time passwords
(tokens)
• Client authentication is
done via password and
certificates
• Server authentication is
done via certificates
• High Security • Moderately
difficult to
deploy
EAP-LEAP • Certificates
• Fixed Passwords
• One-time passwords
(tokens)
• Authentication is based on
MS-CHAP and
MS-CHAPv2
authentication protocols
• Easy
deployment
• Susceptible to
dictionary
attacks
EAP-FAST • Certificates
• Fixed Passwords
• One-time passwords
(tokens)
•N/A •N/A •N/A