User guide
Index 121
Index
Numerics
802.11
ad-hoc mode .............................................................96
defined......................................................................94
infrastructure mode...................................................96
802.1X
authentication ...........................................................62
overview....................................................................99
A
access point
ad-hoc mode .............................................................60
infrastructure mode...................................................60
introduction...............................................................96
network.....................................................................96
adapter
add network ..............................................................27
disable wired connection...........................................41
folder.........................................................................21
remove......................................................................28
select.........................................................................29
wireless .....................................................................27
ad-hoc mode
defined......................................................................96
setting .......................................................................60
AES
configuration .............................................................61
overview....................................................................98
peer-to-peer...............................................................99
use with association mode ........................................61
airwaves
survey .......................................................................15
anonymous name
for logon....................................................................47
protocol restriction ....................................................48
set .............................................................................47
any
as a network..............................................................59
network, configuring connections .............................59
SIM card, using..........................................................43
association mode
defined......................................................................94
methods ....................................................................60
open..........................................................................60
shared .......................................................................60
WPA..........................................................................60
WPA2........................................................................60
asymmetric cryptography...............................................101
authentication
802.1X ......................................................................95
certificate-based ........................................................50
profile........................................................................38
protocols ...................................................................45
servers, adding ..........................................................84
setting in profile properties........................................44
specify protocol .........................................................44
status.........................................................................23
traditional networks.....................................................2
tunneled ....................................................................46
UAC networks..............................................................4
user ...........................................................................95
wireless .....................................................................94
without password ......................................................50
X.500 names .............................................................84
authentication protocols
add ............................................................................45
inner
most common....................................................49
order of ..............................................................49
multiple .....................................................................45
ordering.....................................................................45
remove ......................................................................46
select inner................................................................49
auto-scan list
add ............................................................................68
defined ......................................................................67
modify.......................................................................69
preferred networks....................................................69
preferred order of networks ......................................69
remove ......................................................................69
switching networks....................................................69
testing .......................................................................70
uses ...........................................................................67
view names in ...........................................................70
B
beacon
defined ......................................................................32
C
certificate
add to trusted server database.............................10, 72
defined ....................................................................101
for authentication ......................................................41
for inner authentication.............................................50
for Windows logon ....................................................41
overview..................................................................101
smart card .................................................................17