User's Manual Part 1
Table Of Contents
- Local Disk
- Contents: Intel(R) PRO/Wireless 2200BG Network Connection Adapter User's Guide
- About Wireless LAN Technology
- Software Installation
- Troubleshooting
- Connecting to a Network using Intel(R) PROSet
- Using Wireless Profiles in Intel(R) PROSet
- Security
- Setting Up Security
- Specifications
- Glossary
- Customer Support
- Regulatory Information
- Warranty
response packets are sent over a non-exposed TLS encrypted channel.
Using PEAP authentication: PEAP settings are required for the authentication of the
client to the authentication server. In PEAP, the client uses EAP-TLS to validate the
server and create a TLS-encrypted channel between client and server. The client can
use another EAP mechanism, such as Microsoft Challenge Authentication Protocol
(MSCHAP) Version 2, over this encrypted channel to enable server validation. The
challenge and response packets are sent over a non-exposed TLS encrypted channel.
The following example describes how to use WPA with TKIP encryption using TTLS or
PEAP authentication.
1. Obtain and install a client certificate, refer to
Setting up the Client for TLS
authentication or consult your system administrator.
2. From the General page, click the Networks tab.
3. Click the Add button.
4. Enter the profile and network (SSID) name.
5. Select Infrastructure for the operating mode.
6. Click Next.
7. Select WPA for the Network Authentication.
8. Select TKIP as the Data Encryption.
9. Check the Use Windows logon checkbox to allow a single-sign-on connection
process. The Credentials dialog displays after you select the profile from the Profile
List.
10. If Use Windows logon is not checked, the credentials can be entered in the user
name and password fields. See step 13, 18 and 19.
11. Set the authentication type to TTLS or PEAP to be used with this connection.
12. Click the Configure button to open the settings dialog.
13. Enter the roaming identity name in the Roaming Identity field. This optional
feature is the 802.1X identity supplied to the authenticator. It is recommended that
this field not contain a true identity, but instead the desired realm (e.g.
anonymous@myrealm).
14. Select the "Certificate Issuer" from the list. Select Any Trusted CA as the default.
● Click the "allow intermediate certificates" checkbox to allow a number of
unspecified certificates to be in the server certificate chain between the
server certificate and the specified CA. If unchecked, then the specified CA
must have directly issued the server certificate.
15. Enter the Server name.
● If you know the server name enter this name.