Configuring IEEE 802.1X Authentication Settings
The machine can connect to an 802.1X network as a client device. A typical 802.1X network consists of a RADIUS server
(authentication server), LAN switch (authenticator), and client devices with authentication software (supplicants). If a
device tries to connect to the 802.1X network, the device must go through user authentication in order to prove that
the connection is made by an authorized user. Authentication information is sent to and checked by a RADIUS server,
which permits or rejects communication to the network depending on the authentication result. If authentication fails,
a LAN switch (or an access point) blocks access from the outside of the network.
IEEE 802.1X Authentication Method
Select the authentication method from the options below. If necessary, install or register a key and certificate or
a CA certificate before configuring IEEE 802.1X authentication (
Network Communication(P. 168) ).
The machine and the authentication server authenticate each other by mutually verifying their certificates. A
key and certificate issued by a certification authority (CA) is required for the client authentication (when
authenticating the machine). For the server authentication, a CA certificate installed via the Remote UI can be
used in addition to a CA certificate preinstalled in the machine.
This authentication method uses a user name and password for the client authentication and a CA certificate
for the server authentication. MSCHAPv2 or PAP can be selected as the internal protocol. TTLS can be used
with PEAP at the same time. Enable TLS for the Remote UI before configuring this authentication method (
Configuring the Key and Certificate for TLS(P. 160) ).
The required settings are almost the same as those of TTLS. MSCHAPv2 is used as the internal protocol.
Enable TLS for the Remote UI before configuring this authentication method (
Certificate for TLS(P. 160) ).
For more information about the basic operations to be performed when setting the machine from the
Remote UI, see
Setting Up Menu Options from Remote UI(P. 187) .
Start the Remote UI and log in to System Manager Mode.
Managing the Machine
Registering the Key and Certificate for
Configuring the Key and