User guide
vi Table of Contents
Odyssey Access Client User Guide
Chapter 6 Managing Network Access 57
Configuring Network Settings......................................................................... 57
Adding or Modifying Network Properties .......................................................58
Network Settings .....................................................................................59
Specifying a Network Name (Network SSID) ..................................... 59
Connecting to Any Available Network ...............................................59
Scanning for Available Networks.......................................................59
Adding a Network Description .......................................................... 59
Specifying a Network Type................................................................60
Specifying a Channel.........................................................................60
Specifying an Association Mode ........................................................ 60
Encryption Methods for an Association Mode ...................................61
FIPS Association Mode (FE Only) ......................................................61
FIPS Secure Encryption (FE Only) .....................................................61
Authentication Settings............................................................................62
Authenticating with a Profile .............................................................62
Automatic Key Generation ................................................................62
Preconfigured Key Settings ...............................................................62
Preshared Keys (WPA or WPA2) .......................................................63
Preconfigured Keys (WEP) ................................................................ 63
Removing a Network .....................................................................................64
Sample Network Configuration Setups ...........................................................65
Sample Configuration for a Corporate Wi-Fi Network..............................65
Sample Configuration for a Wireless Hotspot Network ........................... 65
Sample Configuration for a Home Wireless Network ...............................66
Chapter 7
Managing Auto-Scan Lists 67
Using the Auto-Scan List Dialog......................................................................68
Adding an Auto-Scan List.........................................................................68
Removing an Auto-Scan List ....................................................................69
Modifying an Auto-Scan List .................................................................... 69
Viewing the Names in an Auto-Scan List..................................................70
Chapter 8
Managing Infranet Controller Connections 71
Adding an Infranet Controller to the OAC Configuration ................................71
Connecting and Signing on to an Infranet Controller......................................72
FIPS Mode Constraint ..............................................................................72
Web Portal for Installing and Configuring OAC........................................72
Loading a Certificate to the Trusted Server Database ........................72
Specifying a Preferred Realm and Role....................................................74
Connecting to Multiple Infranet Controllers ............................................. 74
Checking Infranet Controller Status .........................................................75
Compliance Failure and Remediation................................................75
Disconnecting from an Infranet Controller..................................................... 77
Chapter 9
Managing Trusted Servers 79
Overview of Trust Configuration ....................................................................79
Configuring Trust in OAC ...............................................................................80
Using the Simple Method to Configure Trust ..................................................81
Adding a Trusted Server Entry.................................................................81
Server Identity ..................................................................................82
Removing a Trusted Server Entry ............................................................82