User guide

Odyssey Access Client User Guide
122 Index
validate .....................................................................46
validation .................................................................. 46
certificate authority
chain ......................................................................... 81
defined....................................................................102
intermediate..............................................................82
root ......................................................................... 102
certificate chain
defined....................................................................102
trust trees..................................................................83
channel
peer-to-peer...............................................................60
compliance
security policy .............................................................3
configuration
adapter...................................................................... 27
folder ........................................................................21
network..................................................................... 57
profile ................................................................. 37, 38
connect
to Infranet Controller................................................. 72
to network.................................................................29
connection
multiple network....................................................... 31
status .................................................................. 23, 34
types ......................................................................... 31
content dialog............................................................. 12, 22
credentials
secure .......................................................................47
D
data encryption
purpose.....................................................................94
diagnostics
Host Enforcer configuration ......................................91
IPsec ......................................................................... 15
IPsec configuration.................................................... 91
network agent ..................................................... 15, 91
options......................................................................90
save to file.................................................................92
view ..........................................................................90
disconnect
from Infranet Controller ............................................ 77
from network ............................................................ 31
from wireless network...............................................30
DNS name
Infranet Controller.....................................................72
domain
controller
EAP interaction ................................................104
login name ................................................................39
driver software ...................................................................7
dynamic encryption keys
reconnection effects.................................................. 32
E
EAP
as inner authentication.............................................. 50
definition.................................................................100
EAP protocols
outer and inner .........................................................49
EAP-AKA
configuration.............................................................43
overview..................................................................103
with SIM card ............................................................44
EAP-Cisco Wireless .........................................................104
EAP-FAST........................................................................100
credentials.................................................................18
overview..................................................................103
token card .................................................................46
tunneled method .......................................................46
EAP-JUAC ................................................................100, 103
overview..................................................................103
EAP-LEAP .......................................................................100
overview..................................................................104
EAP-over-HTTP ...................................................................4
EAP-PEAP .......................................................................100
generic token card options ........................................46
inner protocols, selecting...........................................51
overview..................................................................103
EAP-POTP .......................................................................100
and token card ..........................................................49
overview..................................................................103
password option........................................................46
PIN ............................................................................52
run-time dialogs ........................................................52
EAP-SIM
configuration.............................................................43
identities ...................................................................44
overview..................................................................103
with SIM card ............................................................44
EAP-TLS..........................................................................100
FIPS profiles ..............................................................13
key generation ..........................................................62
overview..................................................................102
EAP-TTLS........................................................................100
certificate options......................................................48
generic token card options ........................................46
key generation ..........................................................62
overview..................................................................102
settings......................................................................48
encryption ........................................................................24
dynamic keys ............................................................62
method, Networks panel ...........................................61
methods ....................................................................98
methods for association mode ..................................61
pre-configured keys...................................................58
private key ..............................................................101
secure..........................................................................8
status.........................................................................24
endpoint trust status.........................................................24
exportable, private key, FIPS .............................................14
Extensible Authentication Protocol .................................100
F
file menu options..............................................................13
FIPS
adapter requirements................................................13