Using Peap (Eap-Gtc) Security - Acer Atheros AR5B95 Manual

802.11n adapter
Table of Contents

Advertisement

Using PEAP (EAP-GTC) Security

To use PEAP (EAP-GTC) security In the Acer Client Utility, access the Security tab in the
Profile Management window.
1. On the Security tab, choose the WPA radio button.
OR: On the Security tab, choose the 802.1x radio button.
2. Choose PEAP (EAP-GTC) from the drop-down menu.
To use PEAP (EAP-GTC)
server properties must already be set. Check with the IT manager.
1. Click the
2. To avoid the need to log on again after resuming operation (for example, after your
computer goes into standby or hibernate mode), check
Session.
3. Select the appropriate network certificate authority from the drop-down list.
4. Specify a user name for inner PEAP tunnel authentication:
Check
user name.
OR: Enter a PEAP user name in the User Name field to use a separate user name
and start the PEAP authentication process.
5. Choose
Token
Note that Token uses a hardware token device or the Secure Computing SofToken
program (version 1.3 or later) to obtain and enter a one-time password during
authentication.
6. Click
Settings...
Leave the server name field blank for the client to accept a certificate from any
server with a certificate signed by the authority listed in the Network Certificate
Authority drop-down list. (recommended)
Enter the domain name of the server from which the client will accept a
certificate.
The login name used for PEAP tunnel authentication fills in automatically as
PEAP-xxxxxxxxxxxx, where xxxxxxxxxxxx is the computer's MAC
address. Change the login name if needed.
7. Click OK.
8. Enable the profile.
Acer Communications, Inc.
COMPANY CONFIDENTIAL
security, the server must have WPA-PEAP certificates, and the
Configure
button.
Use Windows User Name
or
Static
Password, depending on the user database.
and:
Always Resume the Secure
to use the Windows user name as the PEAP
xiii
Dec 2008

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents