User's Manual
-76-
 Allow  unauthenticated  provision  mode:  During  the  PAC  can  be  provisioned
(distributed  one  time)  to  the  client  automatically.  It  only  supported  "Allow
unauthenticated  provision  mode"  and  use   "EAP-MSCHAP  v2"  authentication  to
authenticate  now.  It  causes  to  continue  with  the  establishment  of  the  inner  tunnel
even though it is made with an unknown server.
 Use  protected  authentication  credential:  Using  PAC,  the  certificate  can  be
provided to the client manually via disk or  a secured network distribution method.
Server Certification
  Certificate issuer: Select the server that issues the certificate.
 Allow intermediate certificates: It must  be in the  server certificate  chain  between
the server certificate and the server specified in the "certificate issuer must be" field.
 Server name: Enter an authentication sever root.
4.3.3 Example to Reconnect 802.1x Authenticated Connection after 802.1x
Authenticated connection Is Failed in Profile
There are  two situations where  a user  is able to reconnect an 802.1x authenticated
connection and  authenticate  successfully  after an 802.1x  authenticated  connection
has failed on the profile page. They are as follows:
When keying in  an identity, password or domain name error:
 Authentication  type  chooses   "PEAP",  key  identity  into  test.  Tunnel  Protocol  is
"EAP-MSCHAP-v2,  the  tunnel  identity  and  tunnel  password  are  tested.  Those
settings are the same  as our intended  AP's setting.










