Configuring the 802.1x Wireless Access Point (Windows CE 5.0)
After typing the IP address for your 802.1x access point in the Web browser address bar, the configuration page appears in the Web browser window. You are now ready to configure your access point.
Microsoft used a Cisco** access point for this test scenario. The procedures in this document refer to Cisco-based hardware and software. If you use a different access point to set up your 802.1x network, refer to the product-specific documentation.
When configuring your access points use the following Service Set Identifiers (SSIDs):
To configure your wireless access point
- On the configuration page, choose the Setup tab, and then choose Express Setup.
- In the Radio Service Set ID (SSID) field, type an SSID for the access point, and then choose OK.
- Under Services, choose Security, and then choose Radio Data Encryption (WEP).
- On the AP Radio Data Encryption page, select the Open checkboxes for the Accept Authentication Type and the Require EAP options, and clear all other check boxes.
- In the Encryption Key box, type a 10-digit WEP key, then from the Key Size dropdown list, select 40 bit, and then, to update the page, choose Apply.
- From the Use of Data Encryption by Station is dropdown list, choose Full Encryption, and then choose OK.
- On the Security Setup page, choose Authentication Server. The following table shows the values to set on the Authenticator Configuration page.
Item Value 802.1X Protocol Version (for EAP Authentication) Draft 10 Server Name/IP TESTSERVER Server Type RADIUS Port 1812 Shared Secret Type the shared secret you specified for each 8021X access point when creating your IAS Clients under Creating IAS Clients on Windows 2000 Server. Timeout (in seconds) 20 User server for EAP Authentication - When you have completed the configuration of the Authentication Server, choose OK.
For additional information about how to set up your wireless access points, refer to the product-specific documentation.
See Also
Configuring the Wireless Access Points for a Network with a Security Infrastructure
Last updated on Thursday, February 02, 2006
Send Feedback on this topic to the authors