Dell 5330dn Workgroup Mono Laser Printer Wireless and Network Guide - Page 54

Network Key Setup, 802.1x Security Setup

Page 54 highlights

higher priority on a RADIUS server. Available authentications are NONE, EAP-MD5, EAP MSCHAPv2 in 802.1x Authentication on Static WEB security. • Encryption: This option will be changed due to the option you have selected in the Authentication field. Network Key Setup Enter the network key due to the Encryption option you have selected. 802.1x Security Setup • 802.1x Authentication: You must select an authentication method which is supported by a RADIUS server. The authentication method is determined by negotiation between clients and the server. Therefore, it is not necessary for the selected authentication to be higher priority on a RADIUS server. Available authentications are NONE, EAP-MD5, EAP MSCHAPv2 in 802.1x Authentication on Static WEB security. Refer to "IEEE 802.1x (WPA-Enterprise Model Only)" on page 48 • Inner Authentication Protocol: EAP-TTLS and PEAP allow for standard RADIUS protocols within their inner tunnel. User authentication is performed by a password. The password credentials are transported in a securely encrypted tunnel that is established using the server certificate. EAP-TTLS supports EAP-MD5, CHAP, MS-CHAP, and MS-CHAPv2. PEAP supports EAP-MD5 and MSCHAPv2 as inner authentications. • Identity Name: EAP-TTLS has a unique feature, TTLS Identity, that other EAP authentication protocols do not offer. It passes your user name through an encrypted tunnel (generally called tunneled TLS) as your credentials. It uses TTLS Identity as your credentials before the encrypted tunnel is created. • User Name: 802.1x EAP authentication methods, such as EAP-MD5, EAPMSCAHPv2, EAP-TTLS, and PEAP, require an EAP user name as an account name. A user name is necessary, if 802.1x authentication is enabled. This is not saved as the default value. 52 Appendix G. Wireless network environment

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68

52
Appendix G. Wireless network environment
higher priority on a RADIUS server. Available authentications are
NONE, EAP-MD5, EAP MSCHAPv2 in 802.1x Authentication on
Static WEB security.
Encryption
: This option will be changed due to the option you have
selected in the Authentication field.
Network Key Setup
Enter the network key due to the Encryption option you have selected.
802.1x Security Setup
802.1x Authentication
: You must select an authentication method which
is supported by a RADIUS server. The authentication method is
determined by negotiation between clients and the server. Therefore, it is
not necessary for the selected authentication to be higher priority on a
RADIUS server. Available authentications are NONE, EAP-MD5, EAP
MSCHAPv2 in 802.1x Authentication on Static WEB security. Refer to
"IEEE 802.1x (WPA-Enterprise Model Only)" on page 48
Inner Authentication Protocol
: EAP-TTLS and PEAP allow for standard
RADIUS protocols within their inner tunnel. User authentication is
performed by a password. The password credentials are transported in a
securely encrypted tunnel that is established using the server certificate.
EAP-TTLS supports EAP-MD5, CHAP, MS-CHAP, and MS-CHAPv2.
PEAP supports EAP-MD5 and MSCHAPv2 as inner authentications.
Identity Name
: EAP-TTLS has a unique feature, TTLS Identity, that other
EAP authentication protocols do not offer. It passes your user name
through an encrypted tunnel (generally called tunneled TLS) as your
credentials. It uses TTLS Identity as your credentials before the encrypted
tunnel is created.
User Name
: 802.1x EAP authentication methods, such as EAP-MD5, EAP-
MSCAHPv2, EAP-TTLS, and PEAP, require an EAP user name as an
account name. A user name is necessary, if 802.1x authentication is
enabled. This is not saved as the default value.