User's Manual

over the TTLS tunnel. The protocols are: PAP (Default), CHAP, MD5, MS-CHAP and MS-
CHAP-V2. See Security Overview for more information.
2. User Credentials:
For PAP, CHAP, MD5, MS-CHAP, and MS-CHAP-V2 protocols, select one of these
authentication methods:
Use the Windows logon: Select to retrieve the user's credentials from the
user's Windows logon process.
NOTE: This option is unavailable if Pre-Logon Connect is not selected during
installation of the Intel PROSet/Wireless software. Refer to
Install or Uninstall the
Single Sign On Feature.
Prompt each time I connect: Select to prompt for user name and password
before you connect to the wireless network. The user name and password must
be first set in the authentication server by the administrator.
Use the following: The user name and password are securely (encrypted)
saved in the profile.
User Name: This user name must match the user name that is set in the
authentication server.
Domain: Name of the domain on the authentication server. The server
name identifies a domain or one of its subdomains (for example,
zeelans.com, where the server is blueberry.zeelans.com). NOTE: Contact
your administrator to obtain the domain name.
Password: This password must match the password that is set in the
authentication server. The entered password characters display as
asterisks.
Confirm Password: Reenter the user password.
3. Roaming Identity: If the Roaming Identity is cleared, %domain%\%username% is the
default.
When 802.1x MS RADIUS is used as an authentication server, the server
authenticates the device that uses the Roaming Identity user name from Intel
PROSet/Wireless software, and ignores the Authentication Protocol MS-CHAP-V2
user name. This feature is the 802.1x identity supplied to the authenticator.
Microsoft IAS RADIUS accepts only a valid user name (dotNet user) for EAP clients.
When 802.1x MS RADIUS is used, enter a valid user name. For all other servers, this
is optional. Therefore, it is recommended to use the desired realm (for example,
anonymous@myrealm) instead of a true identity.
Step 2 of 2: TTLS Server
Validate Server Certificate: Selected.
Certificate Issuer: The server certificate received during the TTLS message exchange
must have been issued by this certificate authority (CA). Trusted intermediate certificate
authorities and root authorities whose certificates exist in the system store are available
for selection. If Any Trusted CA is selected, any CA in the list is acceptable.