User guide
Index 123
Index
certificate requirement ..............................................14
compliance..................................................................8
encryption.................................................................99
FIPS mode
certificate requirements ............................................14
description ................................................................99
on/off ........................................................................13
required.....................................................................61
forget
password...................................................................13
temporary trust .........................................................13
G
generic token card
options ......................................................................47
H
hardware-based token
EAP-POTP dialogs......................................................52
help menu options............................................................20
Host Checker
defined........................................................................3
Host Enforcer
configuration .......................................................15, 91
defined........................................................................3
I
identity
server ........................................................................82
SIM............................................................................44
SIM card ....................................................................44
IMSI
SIM card ....................................................................44
informational graphics......................................................23
Infranet Controller
add to configuration ..................................................71
connect to .................................................................72
defined........................................................................3
disconnect from ........................................................77
DNS name .................................................................72
folder.........................................................................21
IP address..................................................................72
profile requirements..................................................71
status.........................................................................75
Infranet Enforcer
defined........................................................................3
infrastructure mode
access point...............................................................60
defined......................................................................96
initial profile .....................................................................38
inner authentication .........................................................45
defined......................................................................48
select protocol ...........................................................48
inner authentication protocols
add............................................................................50
EAP ...........................................................................50
remove......................................................................50
installation
OAC in traditional network..........................................9
OAC in UAC network ...................................................9
intermediate CA
adding .......................................................................84
advanced usage .........................................................83
overview..................................................................102
IP address
Infranet Controller.....................................................72
IPsec
configuration .............................................................91
K
keyboard shortcuts............................................................24
L
LAN, defined.....................................................................93
Layer 2................................................................................4
Layer 3................................................................................4
LDAP...............................................................................102
leaf node...........................................................................83
LEAP...............................................................................104
license key
check expiration ........................................................20
overview......................................................................9
types ...........................................................................9
lightweight EAP...............................................................104
log files
options ......................................................................89
setting levels..............................................................15
view.....................................................................15, 89
log level
set .............................................................................89
login credentials
certificate...................................................................39
password...................................................................39
SIM Card....................................................................40
soft token ..................................................................39
logon credentials...............................................................11
M
menu bar..........................................................................12
mutual authentication...............................................46, 101
802.1X ......................................................................95
explained.................................................................101
server trust ................................................................95
N
network
any network, configuring...........................................59
association.................................................................60
configuration .............................................................57
configuring
connection to any...............................................59
description field.........................................................59
encryption methods ..................................................61
hardware requirements ...............................................8
multiple connections .................................................31
name
SSID ...................................................................59
overview....................................................................59