User's Manual

Step 2 of 2: MD5 User
1. Select one of the following credential methods:
Use Windows logon user name and password: The 802.1x credentials match
your Windows user name and password. Before connection, you are prompted for
your Windows logon credentials.
NOTE: This option is unavailable if Pre-Logon Connect is not selected during
installation of the Intel PROSet/Wireless software. Refer to
Install or Uninstall
the Single Sign On Feature.
Prompt for the user name and password: Prompt for your user name and
password every time you log onto the wireless network.
Use the following user name and password: Use your saved credentials to log
onto the network.
User Name: This user name must match the user name that is set in the
authentication server by the administrator prior to client authentication. The
user name is case-sensitive. This name specifies the identity supplied to the
authenticator by the authentication protocol operating over the TLS tunnel.
This identity is securely transmitted to the server only after an encrypted
channel has been established.
Domain: Name of the domain on the authentication server. The server name
identifies a domain or one of its sub-domains (for example, zeelans.com,
where the server is blueberry.zeelans.com). NOTE: Contact your administrator
to obtain the domain name.
Password: Specifies the user password. The password characters appear as
asterisks. This password must match the password that is set in the
authentication server.
Confirm Password: Reenter the user password.
2. Click OK to save the credentials.
3. Click Connect to connect to the selected wireless network.
If you did not select Use Windows logon on the Security Settings page and also
did not configure user credentials, an Enter Credentials message appears when
you attempt to connect to this profile. Enter your user name, domain, and
password. Click OK to access the profile.
4. Click OK to close Intel PROSet/Wireless.
Set up a Client with WEP Data Encryption and EAP-SIM NetworK
Authentication
EAP-SIM uses a dynamic session-based WEP key, which is derived from the client adapter and