User`s guide
Zebra Mobile Printers • Wireless Configuration Guide • rev. H 3
WIRELESS SECURITY- EAP-FAST AND WPA EAP-FAST ....................................................38
INTRODUCTION ............................................................................................................38
CONFIGURING THE NETWORK FOR EAP-FAST AUTHENTICATION .................................................38
CONFIGURING THE PRINTER FOR EAP-FAST AUTHENTICATION ...................................................39
C
ONFIGURING FOR WPA EAP-FAST AUTHENTICATION ..........................................................41
WIRELESS SECURITY- EAP-TLS AND WPA EAP-TLS ....................................................... 42
INTRODUCTION ........................................................................................................... 42
CONFIGURING THE NETWORK FOR EAP-TLS AUTHENTICATION .................................................. 42
CONFIGURING THE PRINTER FOR EAP-TLS AUTHENTICATION ..................................................... 43
C
ONFIGURING THE ACCESS POINT FOR WPA EAP-TLS AUTHENTICATION .................................... 45
CONFIGURING THE PRINTER FOR WPA EAP-TLS AUTHENTICATION ............................................ 46
WIRELESS SECURITY- EAP-TTLS AND WPA EAP-TTLS .....................................................47
INTRODUCTION ............................................................................................................47
CONFIGURING THE NETWORK FOR EAP-TTLS AUTHENTICATION ..................................................47
C
ONFIGURING THE PRINTER FOR EAP-TTLS AUTHENTICATION ................................................... 48
CONFIGURING THE ACCESS POINT FOR WPA EAP-TTLS AUTHENTICATION ....................................51
CONFIGURING THE PRINTER FOR WPA EAP-TTLS AUTHENTICATION ...........................................51
WIRELESS SECURITY- PEAP AND WPA PEAP .................................................................52
INTRODUCTION ............................................................................................................52
C
ONFIGURING THE NETWORK FOR PEAP AUTHENTICATION .......................................................52
CONFIGURING THE PRINTER FOR PEAP AUTHENTICATION ......................................................... 53
CONTENTS (Continued)