User's Manual
Table Of Contents
- Use the Intel® PROSet/Wireless WiFi Connection Utility
- Contents
- Use the Intel® PROSet/Wireless WiFi Connection Utility
- Taskbar Icon
- Get Connected
- WiFi Networks List
- Connection Status Icons
- Network Properties
- Network Connection Details
- Intel® Wireless Troubleshooter
- Application Settings (Tools menu)
- Turn Wireless Radio On or Off
- Adapter Settings
- Advanced Statistics (Advanced menu)
- Profile Management
- Profile Wizard General Settings
- Wireless Network Overview
- Security Overview
- Personal Security
- Enterprise Security
- Using the Administrator Tool
- Intel® Wireless Troubleshooter (Tools menu)
- Regulatory Information
- Specifications
- Customer Support
- Warranty Information
- Glossary
with the network.
Authentication Protocols
PAP
Password Authentication Protocol is a two-way handshake protocol designed for use with
PPP. Password Authentication Protocol is a plain text password used on older SLIP systems.
It is not secure. Only available for
TTLS Authentication Type.
CHAP
Challenge Handshake Authentication Protocol is a three-way handshake protocol that is
considered more secure than Password Authentication Protocol. Only available for TTLS
authentication Type.
MS-CHAP (MD4)
Uses a Microsoft version of RSA Message Digest 4 challenge-and-reply protocol. This only
works on Microsoft systems and enables data encryption. To select this authentication
method causes all data to be encrypted. Only available for TTLS authentication type.
MS-CHAP-V2
Introduces an additional feature not available with MS-CHAP-V1 or standard CHAP
authentication, the change password feature. This feature allows the client to change the
account password if the RADIUS server reports that the password has expired. Available for
TTLS and PEAP authentication types.
Generic Token Card (GTC)
Carries user-specific token cards for authentication. The main feature in GTC is Digital
Certificate/Token Card-based authentication. In addition, GTC includes the ability to hide
user name identities until the TLS encrypted tunnel is established, which provides additional
confidentiality that user names are not being broadcast during the authentication phase.
Only available for PEAP authentication type.
TLS
The TLS protocol is intended to secure and authenticate communications across a public
network through data encryption. The TLS Handshake Protocol allows the server and client