Zebra Mobile Printer, Microsoft IAS, Cisco Controller TLS and WPA-TLS, Zebra Setup Utility

Size: px
Start display at page:

Download "Zebra Mobile Printer, Microsoft IAS, Cisco Controller TLS and WPA-TLS, Zebra Setup Utility"

Transcription

1 Zebra Mobile Printer, Microsoft IAS, Cisco Controller TLS and WPA-TLS, Zebra Setup Utility This section of the document illustrates the Microsoft Internet Authentication Service and how TLS and WPA-TLS was configured on this server. This document is meant as an illustration only. Questions on the setup of IAS should be directed to Microsoft. It should be Microsoft that is used to determine if the illustration below is appropriate for your environment. It is important to note that the setup on the IAS server did not differ when using WPA-TLS or TLS. The first series of screenshots shows how a Radius client is added to IAS. In the screenshot below a Cisco controller with the IP address of is added. The IAS server needs to have a client in the clients table to ensure that authentication requests are only being received from valid clients. A secret key is entered on the IAS server. This secret key needs to match the secret key on the radius client ( in this example the Cisco controller).

2

3 A Remote access policy is included in the IAS server. The following screenshots illustrate how a remote policy is added.

4

5

6

7 In the next few screenshots I have illustrated how a policy can be added.

8

9 The example that is provided illustrates TLS and WPA-TLS

10 The next series of screenshots shows how one is able to add a user in the active directory. The username and password that is added in the active directory is the same username and password that is added on the printer.

11 The following screenshot shows how the properties of the user is modified to grant dial-in permission.

12 The event log on the IAS server can be used for troubleshooting purposes.

13

14 There are three certificates needed for TLS authentication. These certificates are obtained from the IAS server and will be placed onto the printer. In this illustration, I am using a web browser on the IAS server to obtain these certificates. Below is how I obtained the root certificate.

15

16

17 This is how I obtained the client(user certificate and corresponding private key.

18

19

20 In my example I am not using a private key password

21

22 You should now have three certificate files. The root certificate, the client or user certificate and the private key for the client. Example below. The printer requires certificates to be in the PEM format. The certificates shown above need to be converted into the PEM format. This is an example of PEM format -----BEGIN CERTIFICATE----- MIIEdDCCA1ygAwIBAgIQXkycNtooCY9Dan4qroszcDANBgkqhkiG9w0BAQUFADAw

23 MSAwHgYKCZImiZPyLGQBGRYQMjAwM1NlcnZlckRvbWFpbjEMMAoGA1UEAxMDSUFT MB4XDTA5MDkwMjIwMjUwMloXDTE0MDkwMjIwMjUwMlowMDEgMB4GCgmSJomT8ixk ARkWEDIwMDNTZXJ2ZXJEb21haW4xDDAKBgNVBAMTA0lBUzCCASIwDQYJKoZIhvcN AQEBBQADggEPADCCAQoCggEBAI87TCa3RHsp/yeJfOp8hrYDnj3EOcdyz58CfSbL qdepyqu1xrrbdjfckb+5frjvjeudi0/e3r2/ymnfv7sjt5ly6bhvjgfdluumm2ir CJ+YIWX0CiPe1YQbp4mrnmHX6cr+RwEOU25tB+X4VyRnCRkAAsbszvHw7S7BDL2P 9ILtYPBt5f2slXWqbJwlUnpDmkm4JFHkex4x4ekWdaQBr+VwhZi8Hi2TouBtJVfj jmur0j8ngzdu0fngqh/jc+aiy8moisjawohwhfjpmrjpi//t+x3my4cpuhgscnpo knudv+h2aqesep+xlxeibewofkwrtsgdklifgjzpoxs7usmcaweaaaocaygwggge MAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBSV3+v3e3V2 bwcqr2kdj/nqfrtu8jccaqoga1udhwscaqewgf4wgfuggfiggfwggbvszgfwoi8v L0NOPUlBUyg0KSxDTj1MYWIyMDAzU2VydmVyLENOPUNEUCxDTj1QdWJsaWMlMjBL ZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9uLERDPTIw MDNTZXJ2ZXJEb21haW4/Y2VydGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNlP29i amvjdensyxnzpwnsterpc3ryawj1dglvblbvaw50hjtodhrwoi8vbgfimjawm3nl cnzlci4ymdazc2vydmvyzg9tywlul0nlcnrfbnjvbgwvsuftkdqplmnybdasbgkr BgEEAYI3FQEEBQIDBAAEMCMGCSsGAQQBgjcVAgQWBBQ+SW/Qioe4qllHBvPIxmKu cpybljanbgkqhkig9w0baqufaaocaqeazffdsgopmajsdcgujcaqaruxi3homb4a W8yZgSAq1ecYuN4wSy1daOSkoI6GJJYhZENqmdklAPlzzBZ2ezbKHfR1NJvXKCOu Byi4jZZlpWwduWhIQf9P+9bahKSQg0RHPyNu3se8zxTdWfTv738cKBnuFOJaz6Z8 Gr3qtDzfmWnywAG3rp2/LNEdq0nTgiI76ugG148DjtAukjsruVQf7/QBCUwJuJEU mlgsjvhnypbdmj8ojm2/6nln3bij2ohhqxjfyrxf8jiz4tyi+bb26/usethjea+d f8vnk5ll27watr3ftcz3kupehagdfute3y/bh/eenkkquixoju1aqq== -----END CERTIFICATE----- This is an example of the private key in PEM format BEGIN RSA PRIVATE KEY----- MIICXgIBAAKBgQDDu0oOlA3LtI26ubm9dc0OYLJ+bs+rzfvYI4r5iE2nbdy/Q4ZJ PQMHuiuhv91Dl8KM6D24HLOltxnIMbPGLI6AQgAAGne9GJlwjZ4xvpk3whJYVrWw kegflsxt79vx74cyumsk2yn0ksgdyb4rimlxxyk6xxbr0/nsqpk0yz7irwidaqab AoGBAKjU2nJsvuGhYkdYgKCuBiyKuCxaxQM68CtlrTDEo8bx+uF4C1MNL5nwukYR S3hMZWJJyUMQbt1YbQLD7H/aWydAmt+oMbAMRpzyVvjhf+vN36s2XsjfD/Hx02MP X+xSuoKuVWv2x5AbQO/xGrmPyp+Pbgv2rUrRa0IB+V5ZmZnBAkEA4F+ui2pkNWsn ntibgur9ji5abbcb1phz9g98xu8ijae/k9efwmw0qgpgsnbs2jqdgg6tg+twfgda TzWRNOKHlwJBAN9SFPPhENaLCJPYoQSvqJQUbKt3y4bYVgnZHcG3eEsz0zO/mFWc XtRIGdfvwQaelOtnUjzX6a9hVYB9vyIJUNECQQCehvvrxN/IXk1ACWB+f7G2I0oA 9hTFRDNLhuXCKGEBjvejIlXeI72Ya2pGx4FxRCJrwMcXzeECiXEGhfJySxtBAkAe par78cv9qlxi8zykjnvy29qnlekgnc4ws7npemlm7pvr5d3igtibrmldxef+iiqo SH7gGj/V8GTq3FX9NYoBAkEAmnH326NyghQVwg1JFUHN6U2a49UM94k7HS689xM+ emetcg2r85lyjg/meiehgpmjjvw35p9dz0ocf7wl/muxgg== -----END RSA PRIVATE KEY----- The tools that I will illustrate the conversion are openssl.exe ( ) and pvk.exe (

24 CA (root certificate example below) C:\openssl_pvkfiles\openssl.exe x509 -inform der -in C:\Zebra_TLS_certs\certnew.cer -out C:\Zebra_TLS_certs\ROOTCERT.pem Client (user certificate below). C:\openssl_pvkfiles\openssl.exe x509 -inform der -in C:\Zebra_TLS_certs\ZEBRA_TLS_CLIENT.cer -out C:\Zebra_TLS_certs\CLIENTCERT.pem

25 Below is an example of how I converted the private key.

26 The three files ending in.pem extension here need to be placed onto the printer. (Later in this illustration)

27 The Event Viewer on the IAS server can be used for troubleshooting purposes. In the screenshots below the event viewer is showing a successful authentication. Additional screenshots from IAS server used in testing. Please consult with Microsoft to see if these settings would be appropriate for your environment. This section of the document illustrates a Cisco Wireless controller. This document is meant as an illustration only. Questions on the setup of your Cisco controller should be directed to Cisco. It should be Cisco that is used to determine if the illustration below is appropriate for your environment This illustration shows how the Cisco Controller was configured for TLS initially and then WPA-TLS. With TLS or WPA-TLS the authentication request is forwarded to a Radius server. The following screenshots illustrate how a radius server can be added.

28 The example below shows an entry of a radius server with an IP address of and utilizing the port number of and 1812 are common port numbers used with the RADIUS protocol. A secret key is also entered. This secret key needs to match the secret key that is entered on the RADIUS server. The first step illustrated here is how an ESSID is created. In this example the ESSID is ZebraTLS1 Please note that ESSID s are case sensitive.

29

30 This screenshot shows how to configure 802.1x (TLS)

31 The next screen is showing where the controller is passing the authentication packets to.

32 The screenshots below show the advanced eap settings used in the illustration. Please consult with Cisco to determine the appropriate values for your environment.

33 The screenshots below show what a successful TLS connection appears on the controller.

34 The next screenshots show how the controller was set for WPA-TLS. In this example that I have enabled both wpa and wpa2 as shown below.

35 With WPA-TLS, the authentication is often done by an external radius server. In this example I have entered the ip address for the radius server as shown below. Below is an example of what the controller shows for a successful WPA-TLS authentication.

36 This section of the document illustrates how to configure the printer for TLS and will continue by illustrating how to configure the printer for WPA-TLS. The illustration will use the Zebra Setup Utility as the method for configuring the printer. Please ensure that you are using the most current version of the Zebra Setup Utility before continuing. The most current version of the Zebra Setup Utility can be downloaded at

37 There are three certificate files needed for TLS. These files need to be stored on the printer with specific names. CACERTSV.NRD for the CA root certificate CERTCLN.NRD for the user/client certificate PRIVKEY.NRD for the user/client private key certificate. In my illustration, I have created three files or certificates that are now in the PEM format. THESE ARE THE THREE CERTIFICATES THAT CAN BE STORED. ROOTCERTIFICATE.PEM = CACERTSV.NRD PRIVATEKEY.PEM = PRIVKEY.NRD CLIENTCERT.PEM = CERTCLN.NRD The files that were created earlier in this illustration were renamed CACERTSV.NRD (Rootcertificate.pem), PRIVKEY.NRD (PRIVATEKEY.PEM) and CERTCLN.NRD(CLIENTCERT.PEM) The screenshots below illustrate how the Zebra Setup Utility to configure the printer for both EAP-TLS and WPA-EAP-TLS

38

39 In this illustration I am configuring the printer for DHCP. In this example I have chosen the following radio information. Please note that this screen is only available on select printers. It may not be applicable for other printers.

40 One needs to set the printer to match the ESSID that was previously configured on the Cisco controller. (NPS_TLS) The screenshot below illustrates EAP-TLS The screenshot below illustrates WPA-EAP-TLS

41

42

43

44 Click Next

45

Zebra Setup Utility, Zebra Mobile Printer, Microsoft NPS, Cisco Controller, PEAP and WPA-PEAP

Zebra Setup Utility, Zebra Mobile Printer, Microsoft NPS, Cisco Controller, PEAP and WPA-PEAP Zebra Setup Utility, Zebra Mobile Printer, Microsoft NPS, Cisco Controller, PEAP and WPA-PEAP This section of the document illustrates the Microsoft Network Policy Server and how PEAP and WPA- PEAP was

More information

Zebra Mobile Printer, Zebra Setup Utility, Cisco ACS, Cisco Controller PEAP and WPA-PEAP

Zebra Mobile Printer, Zebra Setup Utility, Cisco ACS, Cisco Controller PEAP and WPA-PEAP Zebra Mobile Printer, Zebra Setup Utility, Cisco ACS, Cisco Controller PEAP and WPA-PEAP This section of the document illustrates the Cisco ACS radius server and how PEAP and WPA-PEAP was configured on

More information

Zebra Setup Utility, Zebra Mobile Printer, Microsoft IAS, Cisco Access Point, PEAP and WPA-PEAP

Zebra Setup Utility, Zebra Mobile Printer, Microsoft IAS, Cisco Access Point, PEAP and WPA-PEAP Zebra Setup Utility, Zebra Mobile Printer, Microsoft IAS, Cisco Access Point, PEAP and WPA-PEAP This section of the document illustrates the Microsoft Internet Authentication Service and how PEAP and WPA-PEAP

More information

Zebra Setup Utility, Zebra Mobile Printer, IAS, Symbol / Motorola Access point, PEAP and WPA-PEAP

Zebra Setup Utility, Zebra Mobile Printer, IAS, Symbol / Motorola Access point, PEAP and WPA-PEAP Zebra Setup Utility, Zebra Mobile Printer, IAS, Symbol / Motorola Access point, PEAP and WPA-PEAP This section of the document illustrates the Microsoft Internet Authentication Service and how PEAP and

More information

Zebra Setup Utility, Zebra Mobile Printer, Microsoft NPS, Cisco Access Point, PEAP and WPA-PEAP

Zebra Setup Utility, Zebra Mobile Printer, Microsoft NPS, Cisco Access Point, PEAP and WPA-PEAP Zebra Setup Utility, Zebra Mobile Printer, Microsoft NPS, Cisco Access Point, PEAP and WPA-PEAP This section of the document illustrates the Microsoft Network Policy Server and how PEAP and WPA- PEAP was

More information

Zebra Setup Utility, Zebra Mobile Printer, NPS, Symbol / Motorola Access point, PEAP and WPA-PEAP

Zebra Setup Utility, Zebra Mobile Printer, NPS, Symbol / Motorola Access point, PEAP and WPA-PEAP Zebra Setup Utility, Zebra Mobile Printer, NPS, Symbol / Motorola Access point, PEAP and WPA-PEAP This section of the document illustrates the Microsoft Network Policy Server and how PEAP and WPA- PEAP

More information

Zebra Setup Utility, Zebra Mobile Printer, Cisco ACS, Cisco Access Point, EAP-FAST, WPA-EAP-FAST

Zebra Setup Utility, Zebra Mobile Printer, Cisco ACS, Cisco Access Point, EAP-FAST, WPA-EAP-FAST Zebra Setup Utility, Zebra Mobile Printer, Cisco ACS, Cisco Access Point, EAP-FAST, WPA-EAP-FAST This section of the document illustrates the Cisco ACS radius server and how EAP- FAST WPA-EAP- FAST was

More information

Using EAP-TTLS and WPA EAP-TTLS Authentication Security on a Wireless Zebra Tabletop Printer

Using EAP-TTLS and WPA EAP-TTLS Authentication Security on a Wireless Zebra Tabletop Printer Using EAP-TTLS and WPA EAP-TTLS Authentication Security on a Wireless Zebra Tabletop Printer Q. What is EAP-TTLS? A. Extensible Authentication Protocol- Tunneled Transport Level Security is an IEEE 802.1x

More information

WPA - Setup for the Wireless Printers

WPA - Setup for the Wireless Printers WPA - Setup for the Wireless Printers 1. WPA - PSK 2. WPA-LEAP Tabletop printers with the Wireless Option can be configured to use WPA-PSK or WPA- LEAP. When configuring the printers for WPA one needs

More information

Using PEAP and WPA PEAP Authentication Security on a Zebra Wireless Tabletop Printer

Using PEAP and WPA PEAP Authentication Security on a Zebra Wireless Tabletop Printer Using PEAP and WPA PEAP Authentication Security on a Zebra Wireless Tabletop Printer Q. What is PEAP? A. Protected Extensible Authentication Protocol is an IEEE 802.1x EAP security method that uses an

More information

Configuring 802.1X Settings on the WAP351

Configuring 802.1X Settings on the WAP351 Article ID: 5078 Configuring 802.1X Settings on the WAP351 Objective IEEE 802.1X authentication allows the WAP device to gain access to a secured wired network. You can configure the WAP device as an 802.1X

More information

802.1x Radius Setup Guide Working AirLive AP with Win X Radius Server

802.1x Radius Setup Guide Working AirLive AP with Win X Radius Server OvisLink 8000VPN VPN Guide 802.1x Radius Setup Guide Working AirLive AP with Win2003 802.1X Radius Server Table of Content Secured Enterprise Wireless Environment Configuration Guide... 3 WHAT IS THIS

More information

Install Certificate on the Cisco Secure ACS Appliance for PEAP Clients

Install Certificate on the Cisco Secure ACS Appliance for PEAP Clients Install Certificate on the Cisco Secure ACS Appliance for PEAP Clients Document ID: 64067 Contents Introduction Prerequisites Requirements Components Used Conventions Microsoft Certificate Service Installation

More information

802.1x Port Based Authentication

802.1x Port Based Authentication 802.1x Port Based Authentication Johan Loos Johan at accessdenied.be Who? Independent Information Security Consultant and Trainer Vulnerability Management and Assessment Wireless Security Next-Generation

More information

Understanding ACS 5.4 Configuration

Understanding ACS 5.4 Configuration CHAPTER 2 ACS 5.4 Configuration : This chapter explains the differences in configuration between ACS 3.x and 4.x and ACS 5.4 when you convert the existing 3.x and 4.x configurations to 5.4. This chapter

More information

Configuring EAP for Wireless Network Connectivity By Victor Zapata

Configuring EAP for Wireless Network Connectivity By Victor Zapata Configuring EAP for Wireless Network Connectivity By Victor Zapata Requirements: 1. Windows 2000 Domain Controller Service Pack 2 with hotfixes Q306260 and Q304347 OR Service Pack 3 2. Enterprise Certificate

More information

Internet access system through the Wireless Network of the University of Bologna (last update )

Internet access system through the Wireless Network of the University of Bologna (last update ) Internet access system through the Wireless Network of the University of Bologna (last update 7.03.2012) Printable service summary document: the updated version is available online at the following address

More information

LAB: Configuring LEAP. Learning Objectives

LAB: Configuring LEAP. Learning Objectives LAB: Configuring LEAP Learning Objectives Configure Cisco ACS Radius server Configure a WLAN to use the 802.1X security protocol and LEAP Authenticate with an access point using 802.1X security and LEAP

More information

Intelligent IP-Enabled Access Control Solutions

Intelligent IP-Enabled Access Control Solutions IP-Enabled Locks: Facts for IT Intelligent IP-Enabled Access Control Solutions The information sent over a site-wide 100 lock deployment in 24 hours is the size of a standard email message PoE and ESD

More information

Secure ACS for Windows v3.2 With EAP TLS Machine Authentication

Secure ACS for Windows v3.2 With EAP TLS Machine Authentication Secure ACS for Windows v3.2 With EAP TLS Machine Authentication Document ID: 43722 Contents Introduction Prerequisites Requirements Components Used Background Theory Conventions Network Diagram Configuring

More information

MCSA Guide to Networking with Windows Server 2016, Exam

MCSA Guide to Networking with Windows Server 2016, Exam MCSA Guide to Networking with Windows Server 2016, Exam 70-741 First Edition Chapter 7 Implementing Network Policy Server 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in

More information

Configuring the Client Adapter through Windows CE.NET

Configuring the Client Adapter through Windows CE.NET APPENDIX E Configuring the Client Adapter through Windows CE.NET This appendix explains how to configure and use the client adapter with Windows CE.NET. The following topics are covered in this appendix:

More information

Cisco Secure ACS for Windows v3.2 With PEAP MS CHAPv2 Machine Authentication

Cisco Secure ACS for Windows v3.2 With PEAP MS CHAPv2 Machine Authentication Cisco Secure ACS for Windows v3.2 With PEAP MS CHAPv2 Machine Authentication Document ID: 43486 Contents Introduction Prerequisites Requirements Components Used Background Theory Conventions Network Diagram

More information

Authentication and Security: IEEE 802.1x and protocols EAP based

Authentication and Security: IEEE 802.1x and protocols EAP based Authentication and Security: IEEE 802.1x and protocols EAP based Pietro Nicoletti Piero[at]studioreti.it 802-1-X-EAP-Eng - 1 P. Nicoletti: see note pag. 2 Copyright note These slides are protected by copyright

More information

Table of Contents. Why doesn t the phone pass 802.1X authentication?... 16

Table of Contents. Why doesn t the phone pass 802.1X authentication?... 16 Table of Contents ABOUT 802.1X... 3 YEALINK PHONES COMPATIBLE WITH 802.1X... 3 CONFIGURING 802.1X SETTINGS... 4 Configuring 802.1X using Configuration Files... 4 Configuring 802.1X via Web User Interface...

More information

Wired Dot1x Version 1.05 Configuration Guide

Wired Dot1x Version 1.05 Configuration Guide Wired Dot1x Version 1.05 Configuration Guide Document ID: 64068 Introduction Prerequisites Requirements Components Used Conventions Microsoft Certificate Services Installation Install the Microsoft Certificate

More information

Securing Wireless LANs with Certificate Services

Securing Wireless LANs with Certificate Services 1 Securing Wireless LANs with Certificate Services PHILIP HUYNH University of Colorado at Colorado Springs Abstract Wireless Local Access Network (WLAN) is used popularly in almost everywhere from the

More information

AmbiCom WL11-SD Wireless LAN SD Card. User Manual

AmbiCom WL11-SD Wireless LAN SD Card. User Manual AmbiCom WL11-SD Wireless LAN SD Card User Manual Version 3.0 October 15, 2004 Table of Contents 1 WL11-SD features...3 2 Package Contents & System Requirements...3 2.1 Package Contents... 3 2.2 System

More information

PEAP under Unified Wireless Networks with ACS 5.1 and Windows 2003 Server

PEAP under Unified Wireless Networks with ACS 5.1 and Windows 2003 Server PEAP under Unified Wireless Networks with ACS 5.1 and Windows 2003 Server Document ID: 112175 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Windows

More information

Cisco 4400 Series Wireless LAN Controllers PEAP Under Unified Wireless Networks with Microsoft Internet Authentication Service (IAS)

Cisco 4400 Series Wireless LAN Controllers PEAP Under Unified Wireless Networks with Microsoft Internet Authentication Service (IAS) Cisco 4400 Series Wireless LAN Controllers PEAP Under Unified Wireless Networks with Microsoft Internet Authentication Service (IAS) HOME SUPPORT PRODUCT SUPPORT WIRELESS CISCO 4400 SERIES WIRELESS LAN

More information

Reference Card: How to connect Windows 7 to UniWireless

Reference Card: How to connect Windows 7 to UniWireless Reference Card: How to connect Windows 7 to UniWireless Important Information Windows 7 is not supported by ITS. These instructions provided are only a guide and do not provide any troubleshooting assistance.

More information

How to Configure Mobile VPN for Forcepoint NGFW TECHNICAL DOCUMENT

How to Configure Mobile VPN for Forcepoint NGFW TECHNICAL DOCUMENT How to Configure Mobile VPN for Forcepoint NGFW TECHNICAL DOCUMENT Table of Contents TABLE OF CONTENTS 1 BACKGROUND 2 WINDOWS SERVER CONFIGURATION STEPS 2 CONFIGURING USER AUTHENTICATION 3 ACTIVE DIRECTORY

More information

Remote Support Security Provider Integration: RADIUS Server

Remote Support Security Provider Integration: RADIUS Server Remote Support Security Provider Integration: RADIUS Server 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks

More information

Secure Access Configuration Guide For Wireless Clients

Secure Access Configuration Guide For Wireless Clients ProCurve Networking Secure Access Configuration Guide For Wireless Clients Secure Access Configuration Guide For Wireless Clients Introduction... 2 Configuration Scenarios... 2 Required Network Services...

More information

Configuring the Client Adapter through the Windows XP Operating System

Configuring the Client Adapter through the Windows XP Operating System APPENDIX E Configuring the Client Adapter through the Windows XP Operating System This appendix explains how to configure and use the client adapter with Windows XP. The following topics are covered in

More information

Owner of the content within this article is Written by Marc Grote

Owner of the content within this article is  Written by Marc Grote Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Configuring Forefront TMG client VPN access with NAP Abstract This article will show you how

More information

Network. NEC Portable Projector NP905/NP901W WPA Setting Guide. Security WPA. Supported Authentication Method WPA-PSK WPA-EAP WPA2-PSK WPA2-EAP

Network. NEC Portable Projector NP905/NP901W WPA Setting Guide. Security WPA. Supported Authentication Method WPA-PSK WPA-EAP WPA2-PSK WPA2-EAP USB(LAN) WIRELESS WIRELESS USB LAN L/MONO R L/MONO R SELECT 3D REFORM AUTO ADJUST SOURCE AUDIO IN MONITOR OUT AUDIO OUT COMPUTER / COMPONENT 2 IN PC CONTROL HDMI IN AUDIO IN AC IN USB LAMP STATUS NEC Portable

More information

Application Example (Standalone EAP)

Application Example (Standalone EAP) Application Example (Standalone EAP) CHAPTERS 1. Determine the Network Requirements 2. Build the Network Topology 3. Log In to the EAP 4. Configure the EAP 5. Test the Network This guide applies to: EAP225-Outdoor

More information

Configuring the Client Adapter through the Windows XP Operating System

Configuring the Client Adapter through the Windows XP Operating System APPENDIX E through the Windows XP Operating System This appendix explains how to configure and use the client adapter with Windows XP. The following topics are covered in this appendix: Overview, page

More information

How to Configure SSL Interception in the Firewall

How to Configure SSL Interception in the Firewall Most applications encrypt outgoing connections with SSL or TLS. SSL Interception decrypts SSL-encrypted traffic to allow Application Control features (such as the Virus Scanner, ATD, URL Filter, Safe Search,

More information

Wireless for Windows 7

Wireless for Windows 7 Wireless for Windows 7 The new CWSL wireless network consists of three different wireless networks CWSL Faculty-Staff - This network is for faculty and staff only. (uses WPA2-Enterprise encryption) CWSL

More information

Configuring Funk Odyssey Software, Avaya AP-3 Access Point, and Avaya

Configuring Funk Odyssey Software, Avaya AP-3 Access Point, and Avaya Configuring Funk Odyssey Software, Avaya AP-3 Access Point, and Avaya 802.11a/b Wireless Client for User Authentication (802.1x) and Data Encryption - Issue 1.0 Abstract These Application Notes describe

More information

Implementing Security in Windows 2003 Network (70-299)

Implementing Security in Windows 2003 Network (70-299) Implementing Security in Windows 2003 Network (70-299) Level 1 Authorization & Authentication 2h 20m 20s 1.1 Group Strategy 1.2 Group Scopes 1.3 Built-in Groups 1.4 System or Special Groups 1.5 Administrating

More information

Troubleshooting CHAPTER

Troubleshooting CHAPTER CHAPTER 10 This chapter provides information for diagnosing and correcting common problems that may occur when you install and operate the client adapter. The following topics are covered in this chapter:

More information

About 802.1X... 3 Yealink IP Phones Compatible with 802.1X... 3 Configuring 802.1X Settings... 5 Configuring 802.1X using configuration files...

About 802.1X... 3 Yealink IP Phones Compatible with 802.1X... 3 Configuring 802.1X Settings... 5 Configuring 802.1X using configuration files... About 802.1X... 3 Yealink IP Phones Compatible with 802.1X... 3 Configuring 802.1X Settings... 5 Configuring 802.1X using configuration files...5 Configuring 802.1X via web user interface...8 Configuring

More information

Security Provider Integration RADIUS Server

Security Provider Integration RADIUS Server Security Provider Integration RADIUS Server 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property

More information

Question: 1 The NAC Agent uses which port and protocol to send discovery packets to an ISE Policy Service Node?

Question: 1 The NAC Agent uses which port and protocol to send discovery packets to an ISE Policy Service Node? Volume: 385 Questions Question: 1 The NAC Agent uses which port and protocol to send discovery packets to an ISE Policy Service Node? A. tcp/8905 B. udp/8905 C. http/80 D. https/443 Answer: A Question:

More information

APP NOTES Onsight Rugged Smart Camera Wireless Network Configuration

APP NOTES Onsight Rugged Smart Camera Wireless Network Configuration APP NOTES Onsight Rugged Smart Camera Wireless Network Configuration July 2016 Table of Contents 1. Overview... 4 1.1 Onsight Setup Wizard... 4 1.2 Onsight Wireless Manual Setup... 4 1.3 Hotspot Login...

More information

Internet Access: Wireless WVU.Encrypted Network Connecting a Windows 7 Device

Internet Access: Wireless WVU.Encrypted Network Connecting a Windows 7 Device Internet Access: Wireless WVU.Encrypted Network Connecting a Windows 7 Device Prerequisites An activated MyID account is required to use ResNet s wireless network. If you have not activated your MyID account,

More information

Managing Certificates

Managing Certificates Loading an Externally Generated SSL Certificate, page 1 Downloading Device Certificates, page 4 Uploading Device Certificates, page 6 Downloading CA Certificates, page 8 Uploading CA Certificates, page

More information

Wireless-N. User Guide. USB Network Adapter WUSB300N WIRELESS. Model No.

Wireless-N. User Guide. USB Network Adapter WUSB300N WIRELESS. Model No. 2.4 GHz WIRELESS Wireless-N USB Network Adapter User Guide Model No. WUSB300N Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark

More information

Managing Certificates

Managing Certificates CHAPTER 12 The Cisco Identity Services Engine (Cisco ISE) relies on public key infrastructure (PKI) to provide secure communication for the following: Client and server authentication for Transport Layer

More information

Cisco Exam Questions & Answers

Cisco Exam Questions & Answers Cisco 300-208 Exam Questions & Answers Number: 300-208 Passing Score: 800 Time Limit: 120 min File Version: 38.4 http://www.gratisexam.com/ Exam Code: 300-208 Exam Name: Implementing Cisco Secure Access

More information

NetMotion Integration with GreenRADIUS - Quick Start Guide

NetMotion Integration with GreenRADIUS - Quick Start Guide NetMotion Integration with GreenRADIUS - Quick Start Guide March 15, 2016 2016 GreenRADIUS. All rights reserved. Page 1 of 16 2016 GreenRADIUS. All rights reserved. Page 2 of 16 Contents 1 GreenRADIUS

More information

Chapter 6: Digital Certificates Introduction Authentication Methods PKI Digital Certificate Passing

Chapter 6: Digital Certificates Introduction Authentication Methods PKI Digital Certificate Passing Chapter 6: Digital Certificates Introduction Methods PKI Digital Certificate Passing Prof Bill Buchanan OBE http://asecuritysite.com/crypto06 http://asecuritysite.com/encryption Identity on the Internet

More information

Eduroam Wireless Network Configuration (Mac OS X)

Eduroam Wireless Network Configuration (Mac OS X) Eduroam Wireless Network Configuration (Mac OS X) Last Revised: 06/10/11 Eduroam Wireless Network Configuration (Mac OS X) This Quick Start guide is for configuring a computer running Snow Leopard (Mac

More information

Manually Configuring Windows 7 for Wireless PittNet

Manually Configuring Windows 7 for Wireless PittNet Technology Help Desk 412 624-HELP [4357] http://technology.pitt.edu Manually Configuring Windows 7 for Wireless PittNet If you are not able to connect to Wireless PittNet using our automated wizard, you

More information

Protected EAP (PEAP) Application Note

Protected EAP (PEAP) Application Note to users of Microsoft Windows 7: Cisco plug-in software modules such as EAP-FAST and PEAP are compatible with Windows 7. You do not need to upgrade these modules when you upgrade to Windows 7. This document

More information

For my installation, I created a VMware virtual machine with 128 MB of ram and a.1 GB hard drive (102 MB).

For my installation, I created a VMware virtual machine with 128 MB of ram and a.1 GB hard drive (102 MB). HOWTO: ZeroShell WPA Enterprise by Paul Taylor ZeroShell can be obtained from: http://www.zeroshell.net/eng/ For my installation, I created a VMware virtual machine with 128 MB of ram and a.1 GB hard drive

More information

Configuring the Cisco VPN 3000 Concentrator with MS RADIUS

Configuring the Cisco VPN 3000 Concentrator with MS RADIUS Configuring the Cisco VPN 3000 Concentrator with MS RADIUS Document ID: 20585 Contents Introduction Prerequisites Requirements Components Used Conventions Install and Configure the RADIUS Server on Windows

More information

IMPORTANT INFORMATION FOR CURTIN WIRELESS ACCESS - STUDENT / WINDOWS XP -

IMPORTANT INFORMATION FOR CURTIN WIRELESS ACCESS - STUDENT / WINDOWS XP - IMPORTANT INFORMATION FOR CURTIN WIRELESS ACCESS - STUDENT / WINDOWS XP - Information required for connection to the Curtin Wireless network: Wireless network names There are two wireless networks operating

More information

NE-2277 Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services

NE-2277 Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services NE-2277 Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services Summary Duration 5 Days Audience IT Professionals Level 300 Technology Microsoft

More information

802.1X Environment Establishment and Telephone Set Configuration Description

802.1X Environment Establishment and Telephone Set Configuration Description 802.1X Environment Establishment and Telephone Set Configuration Description Version: Release date: 1 Contents Contents... 1 1 802.1X Introduction... 2 1.1 Overview... 2 1.2 802.1X Authentication

More information

Cisco Exam Questions & Answers

Cisco Exam Questions & Answers Cisco 300-208 Exam Questions & Answers Number: 300-208 Passing Score: 800 Time Limit: 120 min File Version: 38.4 http://www.gratisexam.com/ Exam Code: 300-208 Exam Name: Implementing Cisco Secure Access

More information

GHz g. Wireless A+G. User Guide. Notebook Adapter. Dual-Band. Dual-Band WPC55AG a. A Division of Cisco Systems, Inc.

GHz g. Wireless A+G. User Guide. Notebook Adapter. Dual-Band. Dual-Band WPC55AG a. A Division of Cisco Systems, Inc. A Division of Cisco Systems, Inc. Dual-Band 5 GHz 802.11a + GHz 2.4 802.11g WIRELESS Dual-Band Wireless A+G Notebook Adapter User Guide Model No. WPC55AG Copyright and Trademarks Specifications are subject

More information

How to configure a Point-to-Point link

How to configure a Point-to-Point link How to configure a Point-to-Point link SilverNet equipment comes Pre-configured on IP addresses 192.168.0.229 or 192.168.0.228. There may be some instances where you need to reset the unit or the unit

More information

Light Mesh AP. User s Guide. 2009/2/20 v1.0 draft

Light Mesh AP. User s Guide. 2009/2/20 v1.0 draft Light Mesh AP User s Guide 2009/2/20 v1.0 draft i FCC Certifications This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules.

More information

A Division of Cisco Systems, Inc. GHz g. Wireless-G. USB Network Adapter. User Guide WIRELESS WUSB54G. Model No.

A Division of Cisco Systems, Inc. GHz g. Wireless-G. USB Network Adapter. User Guide WIRELESS WUSB54G. Model No. A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G USB Network Adapter User Guide Model No. WUSB54G Copyright and Trademarks Specifications are subject to change without notice. Linksys

More information

The table below lists the protocols supported by Yealink SIP IP phones with different versions.

The table below lists the protocols supported by Yealink SIP IP phones with different versions. Table of Contents About 802.1X... 3 Yealink IP Phones Compatible with 802.1X... 3 Configuring 802.1X Settings... 5 Configuring 802.1X Using Configuration Files... 6 Configuring 802.1X via Web User Interface...

More information

How to configure a Point-to-Multipoint link

How to configure a Point-to-Multipoint link How to configure a Point-to-Multipoint link SilverNet equipment comes Pre-configured on IP addresses 192.168.0.229 or 192.168.0.228. There may be some instances where you need to reset the unit or the

More information

Implementing Network Admission Control

Implementing Network Admission Control CHAPTER 2 This chapter describes how to implement Network Admission Control (NAC) and includes the following sections: Network Topology Configuration Overview Installing and Configuring the Cisco Secure

More information

Manually Configuring Windows 8 for Wireless PittNet

Manually Configuring Windows 8 for Wireless PittNet Technology Help Desk 412 624-HELP [4357] http://technology.pitt.edu Manually Configuring Windows 8 for Wireless PittNet If you are not able to connect to Wireless PittNet using our automated wizard, you

More information

Lab Configuring LEAP/EAP using Cisco Secure ACS (OPTIONAL)

Lab Configuring LEAP/EAP using Cisco Secure ACS (OPTIONAL) Lab 8.4.5.2 Configuring LEAP/EAP using Cisco Secure ACS (OPTIONAL) Estimated Time: 60 minutes Number of Team Members: Students can work in teams of two. Objective In this lab, the student will learn about

More information

User Databases. ACS Internal Database CHAPTER

User Databases. ACS Internal Database CHAPTER CHAPTER 12 The Cisco Secure Access Control Server Release 4.2, hereafter referred to as ACS, authenticates users against one of several possible databases, including its internal database. You can configure

More information

Cisco Exam Questions and Answers (PDF) Cisco Exam Questions BrainDumps

Cisco Exam Questions and Answers (PDF) Cisco Exam Questions BrainDumps Cisco 300-375 Dumps with Valid 300-375 Exam Questions PDF [2018] The Cisco 300-375 Securing Cisco Wireless Enterprise Networks (WISECURE) exam is an ultimate source for professionals to retain their credentials

More information

How to manage the X.509 Certificates in RUGGEDCOM WIN BS and CPEs Software Version 4.3 RUGGEDCOM WIN FAQ 10/2014

How to manage the X.509 Certificates in RUGGEDCOM WIN BS and CPEs Software Version 4.3 RUGGEDCOM WIN FAQ 10/2014 FAQ 10/2014 How to manage the X.509 Certificates in RUGGEDCOM WIN BS and CPEs Software Version 4.3 RUGGEDCOM WIN http://support.automation.siemens.com/ww/view/en/103158899 This entry is from the Siemens

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 10 Authenticating Users

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 10 Authenticating Users FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 10 Authenticating Users Learning Objectives Explain why authentication is a critical aspect of network security Explain

More information

A Division of Cisco Systems, Inc. GHz g. Wireless-G. PCI Adapter with SRX 400. User Guide WIRELESS WMP54GX4. Model No.

A Division of Cisco Systems, Inc. GHz g. Wireless-G. PCI Adapter with SRX 400. User Guide WIRELESS WMP54GX4. Model No. A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G PCI Adapter with SRX 400 User Guide Model No. WMP54GX4 Copyright and Trademarks Specifications are subject to change without notice.

More information

Layer 2 authentication on VoIP phones (802.1x)

Layer 2 authentication on VoIP phones (802.1x) White Paper www.siemens.com/open Layer 2 authentication on VoIP phones (802.1x) IP Telephony offers users the ability to log-on anywhere in the world. Although this offers mobile workers great advantages,

More information

Figure 35: Active Directory Screen 6. Select the Group Policy tab, choose Default Domain Policy then click Edit.

Figure 35: Active Directory Screen 6. Select the Group Policy tab, choose Default Domain Policy then click Edit. PC and Server Configuration Figure 35: Active Directory Screen 6. Select the Group Policy tab, choose Default Domain Policy then click Edit. Figure 36: Group Policy Tab 7. Select Computer Configuration

More information

Connecting to the NJITSecure wireless network.

Connecting to the NJITSecure wireless network. Connecting to the NJITSecure wireless network. 1. Start by going to the Start menu and selecting Control Panel 2. Your control Panel will most likely be in Category view, you will need to change it to

More information

Buna ISD Secure Wireless CougarNet+

Buna ISD Secure Wireless CougarNet+ Buna ISD Technology Department Buna ISD Secure Wireless CougarNet+ By Christopher Fikes, Network Manager Buna ISD Whether using your personal ipad, or your school issued laptop, CougarNet+ will make your

More information

A Division of Cisco Systems, Inc. GHz 2, g. Wireless-G. User Guide. PCI Adapter WIRELESS. with SpeedBooster WMP54GS (EU/UK/LA) Model No.

A Division of Cisco Systems, Inc. GHz 2, g. Wireless-G. User Guide. PCI Adapter WIRELESS. with SpeedBooster WMP54GS (EU/UK/LA) Model No. A Division of Cisco Systems, Inc. GHz 2,4 802.11g WIRELESS Wireless-G PCI Adapter with SpeedBooster User Guide Model No. WMP54GS (EU/UK/LA) Copyright and Trademarks Specifications are subject to change

More information

IT Quick Reference Guides Connecting to SU-Secure using Windows 8

IT Quick Reference Guides Connecting to SU-Secure using Windows 8 IT Quick Reference Guides Connecting to SU-Secure using Windows 8 Windows Guides CONNECTING TO SU-SECURE WI-FI This document will give you instructions on how to connect your Windows 8 Computer to our

More information

Document ID: Contents. Introduction. Prerequisites. Requirements. Components Used. Conventions. Background Information.

Document ID: Contents. Introduction. Prerequisites. Requirements. Components Used. Conventions. Background Information. Products & Services Local EAP Authentication on the Wireless LAN Controller with EAP-FAST and LDAP Server Configuration Example Document ID: 100590 Contents Introduction Prerequisites Requirements Components

More information

Network Access Flows APPENDIXB

Network Access Flows APPENDIXB APPENDIXB This appendix describes the authentication flows in Cisco Identity Services Engine (ISE) by using RADIUS-based Extensible Authentication Protocol (EAP) and non-eap protocols. Authentication verifies

More information

What can I do in the settings menu of my WL-330 (which settings are there and what can I change)?

What can I do in the settings menu of my WL-330 (which settings are there and what can I change)? What can I do in the settings menu of my WL-330 (which settings are there and what can I change)? Introduction The settings menu of your WL-330 allows you to customise the settings of this range extender.

More information

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

PrepAwayExam.   High-efficient Exam Materials are the best high pass-rate Exam Dumps PrepAwayExam http://www.prepawayexam.com/ High-efficient Exam Materials are the best high pass-rate Exam Dumps Exam : 1Y0-250 Title : Implementing Citrix NetScaler 10 for App and Desktop Solutions Vendor

More information

RADIUS Authentication and Authorization Technical Note

RADIUS Authentication and Authorization Technical Note RADIUS Authentication and Authorization Technical Note VERSION: 9.0 UPDATED: July 2017 Copyright Notices Copyright 2002-2017 KEMP Technologies, Inc. All rights reserved. KEMP Technologies and the KEMP

More information

Manage Administrators and Admin Access Policies

Manage Administrators and Admin Access Policies Manage Administrators and Admin Access Policies Role-Based Access Control, on page 1 Cisco ISE Administrators, on page 1 Cisco ISE Administrator Groups, on page 3 Administrative Access to Cisco ISE, on

More information

Configure 802.1x Authentication with PEAP, ISE 2.1 and WLC 8.3

Configure 802.1x Authentication with PEAP, ISE 2.1 and WLC 8.3 Configure 802.1x Authentication with PEAP, ISE 2.1 and WLC 8.3 Contents Introduction Prerequisites Requirements Components Used Configure Network Diagram Configuration Declare RADIUS Server on WLC Create

More information

Implementation Guide for protecting. SonicWall Security Appliances. with. BlackShield ID

Implementation Guide for protecting. SonicWall Security Appliances. with. BlackShield ID Implementation Guide for protecting SonicWall Security Appliances with BlackShield ID Copyright 2009 CRYPTOCard Inc. http:// www.cryptocard.com Copyright Copyright 2009, CRYPTOCard All Rights Reserved.

More information

Configuring SSL. SSL Overview CHAPTER

Configuring SSL. SSL Overview CHAPTER 7 CHAPTER This topic describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section are:

More information

Configuring 802.1X Authentication Client for Windows 8

Configuring 802.1X Authentication Client for Windows 8 Configuring 802.1X Authentication Client for Windows 8 1. At the Metro Screen, press the windows key on your keyboard together with the alphabets x to go to the Control Panel. Page 1 1.1 In the Control

More information

Guide to Configuring eduroam Using the Aruba Wireless Controller and ClearPass RADIUS

Guide to Configuring eduroam Using the Aruba Wireless Controller and ClearPass RADIUS Guide to Configuring eduroam Using the Aruba Wireless Controller and ClearPass RADIUS Best Practice Document Produced by the UNINETT-led Campus Networking working group Authors: Tom Myren (UNINETT), John-Egil

More information

TippingPoint Best Practice Guide. RADIUS PEAP Configuration for IPS Devices and Cisco ACS. Version:

TippingPoint Best Practice Guide. RADIUS PEAP Configuration for IPS Devices and Cisco ACS. Version: TippingPoint Best Practice Guide RADIUS PEAP Configuration for IPS Devices and Cisco ACS Version: 16.1.1 Copyright Statement Copyright 2016 Trend Micro. Trend Micro Incorporated ( Trend Micro ) makes no

More information

Installing the Client Adapter

Installing the Client Adapter CHAPTER 3 This chapter provides instructions for installing the client adapter driver and client utilities. The following topics are covered in this chapter: Finding the Windows CE Version, page 3-2 Installing

More information

NCR. Wi-Fi Setup Assistant. User guide

NCR. Wi-Fi Setup Assistant. User guide NCR Wi-Fi Setup Assistant User guide 15 Contents 1 Getting started... 3 1.1 Features... 3 1.2 System Requirements... 3 1.3 Installing Wi-Fi Setup Assistant... 4 2 Configuring a Wi-Fi Printer... 6 2.1 Setup

More information

Configure 802.1x - PEAP with FreeRadius and WLC 8.3

Configure 802.1x - PEAP with FreeRadius and WLC 8.3 Configure 802.1x - PEAP with FreeRadius and WLC 8.3 Contents Introduction Prerequisites Requirements Components Used Configure Network Diagram Install httpd Server and MariaDB Install PHP 7 on CentOS 7

More information

Configuring Settings on the Cisco Unified Wireless IP Phone

Configuring Settings on the Cisco Unified Wireless IP Phone CHAPTER 5 Configuring Settings on the Cisco Unified Wireless IP Phone The Settings menu on the Cisco Unified Wireless IP Phone 7921G provides access to view and change network profile settings and several

More information