User's Manual

2-22 / 122
-Delete: Delete the profile, provided that it is not the active profile.
-Scan: Open a window that lists access points that are broadcasting
their SSIDs. Each time you tap the Refresh button, you view an
updated list of APs, with each row showing an AP’s SSID, its received
signal strength indication (RSSI), and whether or not data encryption
is in use (true or false). You can sort the list by clicking on the column
headers. If you are authorized as an administrator, select an SSID
in the list, and tap Commit, you return to the Profile tab to create a
profile for that SSID.
z Radio: Radio attributes in the list box can be selected individually. When
an attribute is selected, the current setting or an appropriate selection box
with the current setting highlighted appears on the right.
z Security: Values for the two primary security attributes, EAP type and
encryption type, are displayed in separate dropdown lists, with the current
values highlighted. When you as an administrator select an EAP type, the
Credentials button appears; when you tap it, a dialog box appears that
enables you to define authentication credentials for that EAP type. When
you as an administrator select an encryption type that requires the
definition of WEP keys or a pre-shared key, the PSKs/WEP Keys button
appears; when you tap it, a dialog box appears that enables you to define
WEP keys or a PSK.
z Commit: To ensure that changes to profile settings made on the tab are
saved in the profile, you must tap the Commit button.
To cause a Summit radio to connect to a typical business WLAN, you must
select a profile that specifies the SSID, EAP type, and encryption type
supported by the WLAN:
z SSID: This is the name or identification of the WLAN.
z EAP type: This is the protocol used to authenticate the device and its user
if the WLAN uses the Enterprise version of Wi-Fi Protected Access (WPA)
and WPA2. SCU supports five EAP types: PEAP with EAP-MSCHAP
(PEAP-MSCHAP), PEAP with EAP-GTC (PEAP-GTC), EAP-TLS, LEAP,
and EAP-FAST
z Encryption: This specifies the type of key used to encrypt and decrypt
transmitted data and how that key is specified or derived. Encryption
options include:
- WPA2 or WPA with dynamic keys (derived from the EAP authentication
process)
- WPA2 or WPA with pre-shared keys
- Static WEP keys
Consult the user’s guide for details on all profile settings, including security
settings.