User guide

Odyssey Access Client User Guide
124 Index
peer-to-peer...............................................................60
preemptive................................................................18
preferred...................................................................18
properties
add or modify .................................................... 58
reconnecting ............................................................. 32
sample configuration.................................................66
scan for available ......................................................59
scan for available connection .................................... 31
security policies........................................................... 3
select......................................................................... 57
settings......................................................................58
type........................................................................... 60
WEP keys..................................................................62
wireless 802.11......................................................... 96
Network Agent
diagnostics ................................................................91
network connection
set timing.................................................................. 16
network name
defined...................................................................... 59
O
OAC
defined........................................................................ 1
deployment environments .......................................... 2
in traditional network.................................................. 2
installing .....................................................................7
register......................................................................20
OAC Manager ................................................................... 11
exit............................................................................25
open mode
WEP..........................................................................60
definition ........................................................... 97
operating system
supported releases ......................................................8
P
PAP/Token Card
password caching......................................................49
passphrases
hexadecimal..............................................................63
password
caution ...................................................................... 41
configure in profile....................................................40
forget ........................................................................ 13
generic token card.....................................................46
POTP options ............................................................46
PEAP
overview .................................................................103
settings in profile properties...................................... 51
token card options ....................................................46
peer-to-peer network
definition...................................................................96
IP addresses ..............................................................96
personal certificate
options for EAP-TTLS ................................................ 50
PIN
caching......................................................................17
EAP-POTP .................................................................52
SIM card ....................................................................44
SIM card settings .......................................................44
preferred network
auto-scan lists............................................................69
preshared passphrase .......................................................95
private key......................................................................101
profile
add............................................................................38
configure ...................................................................37
defined......................................................................37
initial .........................................................................38
modify.......................................................................38
name.........................................................................39
password...................................................................40
sample configuration.................................................56
user info ....................................................................39
user information........................................................43
provider-specific settings
SIM............................................................................44
public key .......................................................................101
R
RADIUS server ................................................................100
realm
defined......................................................................74
preconfigure..............................................................74
reauthentication ...............................................................17
automatic ..................................................................19
purpose ...................................................................104
uses...........................................................................20
reconnecting
effect on encryption keys ..........................................32
to network.................................................................32
release notes..................................................................... vii
remediation ......................................................................75
defined........................................................................6
instructions ...............................................................76
requirements
browser .......................................................................8
installation...................................................................8
roaming..........................................................................104
wireless .....................................................................17
role
defined..................................................................3, 74
preconfigure..............................................................74
root certificate authority .................................................102
RSA soft token ..................................................................42
S
scan
list .............................................................................68
wireless networks......................................................15
scripts
check new .................................................................16
run ............................................................................15
secure authentication
methods ....................................................................94
secure encryption