User's Manual

184 | Onboard Dell Networking W-ClearPass Guest 6.4 | User Guide
Configuring Options for Onboard Client Devices
The Onboard Client tab is used to edit basic configuration options for Windows, Android, and legacy OS X (10.5
and 10.6) devices. This form is not used for iOS or OS X 10.7+ devices.
To specify provisioning settings related to these Onboard-capable devices:
1. Go to Onboard >Deployment and Provisioning, expand the provioning setting's row in the list, and
click its Edit link. On the Device Provisioning Settings form, click the Onboard Client tab.
2. In the Provisioning Address drop-down list, choose the hostname or IP address to use for device
provisioning:
l The system’s hostname (requires DNS resolution) – Select this option to use the system hostname
for device provisioning.
This option requires that the device be able to resolve the listed hostname at the time the device is provisioned.
l The system’s IP address (network adapter name) – Select this option to use the IP address of the
system for device provisioning. The drop-down list includes one option for each of the IP addresses
detected on the system.
Use this option when DNS resolution of the system’s hostname is not available for devices that are in a
provisioning role.
l Other IP address or hostname – Select this option to override the hostname or IP address to be
specified during device provisioning. The administrator must enter the hostname or IP address in the
“Address” text field.
Use this option when special DNS or NAT conditions apply to devices that are in a provisioning role.
3. If you chose Other IP address or hostname in the Provisioning Address drop-down list, use the Address
field to enter a hostname or IP address.
4. The Provisioning Access warning message is displayed when HTTPS is not required for guest access.
HTTPS is recommended for all deployments as it secures the unique device credentials that will be issued to
the device.
When using HTTPS for device provisioning, you must obtain a commercial SSL certificate. Self-signed SSL certificates,