User guide

Table of Contents
Table of Contents vii
Editing a Trusted Server Entry .................................................................83
Using the Advanced Method to Configure Trust .............................................83
Displaying a Trust Tree............................................................................83
Adding Certificate Nodes .........................................................................84
Adding Authentication Servers or Intermediate CA Nodes .......................84
Adding Identity ................................................................................. 84
Removing Nodes ..................................................................................... 86
Viewing Certificate Information...............................................................86
Managing Untrusted Servers....................................................................86
Chapter 10
Viewing Log Files and Diagnostics 89
Accessing Log Files—UE Only ........................................................................89
Accessing Diagnostics ....................................................................................90
IPsec Diagnostics—UE only ..................................................................... 90
IPsec Configuration—UE Only .................................................................91
Network Agent Diagnostics— UE Only ....................................................91
Host Enforcer Configuration—UE Only....................................................91
Save All Diagnostics.................................................................................92
Appendix A
Network Security Concepts 93
Network Security ........................................................................................... 93
Encryption and Association for Secure Authentication.............................94
Authentication Overview...................................................................94
Odyssey Access Client Features for a Secure Network .............................95
802.11 Wireless Networking .......................................................................... 96
Types of 802.11 Wireless Networks......................................................... 96
Access Point Networks ...................................................................... 96
Peer-to-Peer Networks ......................................................................96
Wireless Network Names.........................................................................97
Wired-Equivalent Privacy ....................................................................... 97
Wi-Fi Protected Access and its Encryption Methods ................................98
FIPS 140-2 Encryption Using AES and WPA2 or XSec.......................99
802.1X Authentication ...................................................................................99
Extensible Authentication Protocol ........................................................100
Mutual Authentication.....................................................................101
Certificates ......................................................................................101
EAP-TLS ..........................................................................................102
EAP-TTLS ........................................................................................102
EAP-PEAP .......................................................................................103
EAP-FAST........................................................................................ 103
EAP-JUAC ........................................................................................103
EAP-POTP .......................................................................................103
EAP-SIM and EAP-AKA ....................................................................103
EAP-LEAP........................................................................................ 104
Reauthentication ...................................................................................104
Session Resumption ..............................................................................104
Appendix B
Glossary 107
Index 121