User's Manual

21
Tunneled Authentication:
-- Protocol: When the authentication type is PEAP or TTLS, select a protocol to be
used to build the encrypted tunnel.
-- Identity: This is the protected user EAP Identity used for authentication. The identity
specified may contain up to 63 ASCII characters, is case sensitive and takes the form of
a Network Access Identifier, consisting of <name of the user>@<user’s home realm>.
The user’s home realm is optional and indicates the routing domain.
-- Password: The password used for authentication. It may contain up to 63 ASCII
characters and is case sensitive.
3.3.4 802.1x Setting-CA Server
Use Certificate Chain: When the EAP authentication types such as TLS, TTLS or PEAP is
selected and required a certification to tell the client what server credentials to accept from the
authentication server in order to verify the server, you have to enable this function.
Certificate Issuer: Choose the server from the list to issue the certificate. If “Any Trusted
CA” is selected, any CA included in the list (provided by the Microsoft Certificate Store) is
permitted.
Allow Intermediate Certificates: A server designates an issuer as a trusted root authority by
placing the issuer’s self-signed certificate, which contains the issuer’s public key, into the
trusted root certification authority certificate store of the host computer. Intermediate or
subordinate certification authorities are trusted only if they have a valid certification path from a
trusted root certification authority.
Server Name: Enter the authentication server name.
Server name must match exactly: When selected, the server name must match exactly the
server name found on the certificate.