User guide

Index 125
Index
FIPS...........................................................................13
Layer 2 protocol ........................................................60
security
enforcement................................................................5
settings......................................................................17
server
identity......................................................................82
identity formats.........................................................82
name.........................................................................82
temporary trust .........................................................17
validate certificate .....................................................46
service set identifier .........................................................97
see SSID
session resumption...........................................................17
defined......................................................................18
enable .......................................................................18
limit...........................................................................19
shared mode
WEP ..........................................................................62
defined...............................................................97
shortcut keys ....................................................................24
sidebar .............................................................................12
folders .......................................................................21
signal power, viewing........................................................23
SIM card
any, selecting ............................................................43
configure ...................................................................43
for authentication......................................................43
IDs, entering..............................................................43
IMSI...........................................................................44
login names...............................................................44
manager....................................................................15
PIN ............................................................................44
PIN settings ...............................................................44
set ID.........................................................................43
simultaneous connections
establishing ...............................................................31
single sign on....................................................................11
smart card
certificate ..................................................................41
certificates...............................................................101
FIPS constraint ..........................................................18
PIN prompt ...............................................................17
soft token
authentication options...............................................42
configuration .............................................................42
enable .......................................................................42
for authentication......................................................42
software compatibility ........................................................7
SQL.................................................................................102
SSID
auto-scan list switching..............................................69
defined......................................................................97
status
adapter......................................................................32
connection ..........................................................23, 34
encryption.................................................................24
endpoint trust............................................................24
Infranet Controller.....................................................75
signal power..............................................................23
view...........................................................................23
switch
802.1X ......................................................................96
switching networks, lists ...................................................69
T
temporary trust
enable .......................................................................19
untrusted servers.......................................................86
TKIP
implementing ............................................................61
overview....................................................................98
peer-to-peer...............................................................99
use with association mode.........................................61
TLS
overview..................................................................102
token card
authentication
dialogs................................................................52
password............................................................47
settings...............................................................48
run-time dialogs
EAP-POTP ..........................................................52
tools menu options ...........................................................15
trust
all servers ..................................................................81
configuration
simple method ...................................................81
temporary .................................................................17
trust trees .........................................................................83
trusted server
add ............................................................................81
add certificate......................................................10, 72
Advanced button .......................................................83
advanced method......................................................83
any ............................................................................81
editing .......................................................................83
entering.....................................................................81
leaf nodes..................................................................83
removing ...................................................................82
TTLS
overview..................................................................102
settings......................................................................48
tunnel
encrypted ..................................................................47
password credentials .................................................50
U
Unified Access Control ........................................................3
untrusted server
dialog ........................................................................86
user info
SIM card settings .......................................................43
W
Web portal ..................................................................10, 72
WEP keys..........................................................................58
any network connection ............................................59
defined ......................................................................97