AMX Modero ViewPoint MVP-5200i Operation/Reference Manual page 83

5.2" modero viewpoint touch panel with intercom
Hide thumbs Also See for Modero ViewPoint MVP-5200i:
Table of Contents

Advertisement

PEAP (Protected Extensible Authentication Protocol) was developed as a way to securely transmit
authentication information, such as passwords, over a wireless network environment. PEAP uses only server-
side public key certificates and therefore does not need a client (panel) certificate which makes the
configuration and setup easier.
There are two main versions of the PEAP protocol supported by panel's DeviceScape Wireless Client:


PEAP uses inner authentication mechanisms supported by the DeviceScape Wireless Client, the most common
of which are:


EAP-PEAP security is designed for wireless environments where it is necessary to transmit data securely over
a wireless network.
EAP-PEAP Settings
SSID (Service Set Identifier):
Identity:
Password:
Certificate Authority:
PEAP Version:
Inner Authentication Type:
MVP-5200i 5.2" Modero® ViewPoint® Touch Panel with Intercom
PEAPv0
PEAPv1
MSCHAPv2 with PEAPv0
GTC with PEAPv1
Opens an on-screen keyboard to enter the SSID name used on the target
WAP. The SSID is a unique name used by the WAP, and is assigned to all
panels on that network. An SSID is required by the WAP before the panel is
permitted to join the network.
• The SSID is case sensitive and must not exceed 32 characters.
• Make sure this setting is the same for all points in the wireless network.
• NXA-WAP200Gs use AMX as their default SSID.
• With EAP security, the SSID of the WAP must be entered. If it is left blank,
the panel will try to connect to the first access point detected that supports
EAP. However, a successful connection is not guaranteed because the
detected WAP may be connected to a RADIUS server, which may not
support this EAP type and/or have the proper user identities configured.
Opens an on-screen keyboard to enter an EAP Identity string (used by the
panel to identify itself to an Authentication (RADIUS) Server).
Note: This information is similar to a username used to login to a secured
server or workstation. This works in tandem with the Password string, which
is similar to the password entered to gain access to a secured workstation.
Typically, this is in the form of a username such as jdoe@amx.com.
Opens an on-screen keyboard to enter the network password string specified
for the user entered within the Identity field (used by the panel to identify itself
to an Authentication (RADIUS) Server)
Note: This information is similar to the password entered to gain access to a
secured workstation.
When pressed, the panel displays an on-screen Certificate Authority (CA)
File Location keyboard, which allows you to enter the name of the certificate
authority file which is used to validate the server certificate.This field is
optional.
If a server certificate is used, it should first be downloaded into the panel and
the Certificate Authority field should then be set to the name of that certificate
file. No file path should be used for this setting as all certificates are stored in
a specific directory that the user cannot control or change.
Use the on-screen keyboard's Clear button to erase completely any
previously stored network path information.
When pressed, this field cycles through the choices of available PEAP:
PEAPv0, PEAPv1, or PEAPv1 w/peaplabel=1.
When pressed, this field cycles through the choices of available Inner
Authentication mechanisms supported by the Devicescape Secure Wireless
Client. The most commonly used are: MSCHAPv2 and GTC.
• MSCHAPv2 (used with PEAPv0)
• GTC (used with PEAPv1)
• OTP
• MD5
Protected Setup Pages
69

Advertisement

Table of Contents
loading

Table of Contents