User Manual

The following example describes how to use WPA with TKIP encryption using TTLS or
PEAP authentication.
1. Obtain and install a client certificate, refer to
Setting up the Client for TLS
authentication or consult your system administrator.
2. From the General page, click the Networks tab.
3. Click the Add button.
4. Enter the profile and network (SSID) name.
5. Select Infrastructure for the operating mode.
6. Click Next.
7. Select WPA for the Network Authentication.
8. Select TKIP as the Data Encryption.
9. Set the authentication type to TTLS or PEAP to be used with this connection.
10. Click the Configure button to open the settings dialog.
11. Enter the roaming identity name in the Roaming Identity field. This optional
feature is the 802.1X identity supplied to the authenticator. It is recommended that
this field not contain a true identity, but instead the desired realm (e.g.
anonymous@myrealm).
12. Select the "Certificate Issuer" from the list. Select Any Trusted CA as the default.
Click the "allow intermediate certificates" checkbox to allow a number of
unspecified certificates to be in the server certificate chain between the
server certificate and the specified CA. If unchecked, then the specified CA
must have directly issued the server certificate.
13. Enter the Server name.
If you know the server name enter this name.
Select the appropriate option to match the server name exactly or specify the
domain name.
14. Authentication Protocol:
PEAP: Select MS-CHAP-V2. This parameter specifies the authentication
protocol operating over the PEAP tunnel. The protocols are: MS-CHAP-V2
(Default), GTC, and TLS.
TTLS: Select PAP. This parameter specifies the authentication protocol
operating over the TTLS tunnel. The protocols are: PAP (Default), CHAP,
MD5, MS-CHAP and MS-CHAP-V2.
15. Enter the user name. This username must match the user name that is set in the
authentication server by the IT administrator prior to client's authentication. The
user name is case-sensitive. This name specifies the identity supplied to the
authenticator by the authentication protocol operating over the TLS tunnel. This
user’s identity is securely transmitted to the server only after an encrypted channel