Click here to load reader
View
280
Download
0
Tags:
Embed Size (px)
2. Linux NetworkManager
3. Profiles with NetworkManager
4. Enterprise Type of Profile
5. Enterprise Type of Profile (Cont.)
Fields show only if applicable 6. MAC AirPort Extreme 7. 8. Connecting to a Network 9. 10. Configuring an Ad Hoc Profile
11. Infrastructure Profile
12. Advanced Configuration 13. 14. Advanced Parameters Defines the advanced parameters for 802.1X at a global level or per wireless profile 15. Wireless Connection Details
16. Diagnostic 17. Windows Wireless Zero Configuration (WZC) Overview
Detects broadcast networks Click to access the tool interface 18. Windows Wireless Zero Configuration (WZC) Overview (Cont.)
Automatic Manual or Manual if the network is new or Automatic Connection When Network Is in Range is disabled. Automatic if a profile for it exists and allows connection when in range. To be detected, a WLAN needs to be in range and broadcasting. 19. Windows Wireless Zero Configuration (WZC) Overview (Cont.)
Click to connect Click to change settings or 20. Connecting to Preferred WLANs using WZC
The tool will try to connect to these automatically By default, Windows tries to manage wireless adapters and connections itself. Use WZC or your WLAN adapter vendor provided utility, but not both. WZC will keep, under Preferred networks, the WLANs to which you have connected at least once. It will try to connect to the automatic first, and then will give a list of the available networks. On Advanced tab, you can configure what type of network the utility should try to connect to. 21. Configuring a Profile Using the Wireless Zero Configuration Tool
Association and part of authentication PSK or 802.1x authentication Connect when in range 22.
PSK or 802.1x authentication Connect when in range Association and part of authentication 23. Configuring a Profile Using the WZC PSK Authentication
If PSK, you can enter the key here And this tab becomes inactive 24.
If PSK, you can enter the key here And this tab becomes inactive 25. Configuring a Profile Using the Wireless Zero Configuration Tool (Cont.)
Then Authentication can be configured 26.
Then Authentication can be configured 27. Profile Configuration Example
Use computer name or guest? 28. Profile Configuration Example (Cont.)
Use default windows ID? If no defaults, you will be prompted 29. State Table 30. Summary
31. Summary (Cont.)
32.