Document toolboxDocument toolbox

(12.1-en) Default Wi-Fi Network

This article shows how to configure wireless network connections in IGEL OS.


Menu path: Network > Wireless > Default Wi-Fi Network





Disable encryption

No encryption is used. (Default)



Enable WEP encryption

WEP encryption is used.



Enable WPA encryption

WPA encryption is used.



Wireless network name (SSID)

Name of the wireless network (SSID)

For WEP Encryption

Transmit key ID

The key used for initiating a connection. Choose from a maximum of four configurable keys. (Default: 1)



Key format

  • ASCII (Default)

  • Hexadecimal



Key  [1-4]

Enter the key here.

Characters to be entered for WEP keys:

  • For 64-bit encryption, 5 characters (ASCII) or 10 hex digits (hexadecimal)

  • For 128-bit encryption, 13 characters (ASCII) or 26 hex digits (hexadecimal)



For WPA/WPA2/WPA3 Personal Encryption

Network authentication

  • WPA Personal: Wi-Fi Protected Access Pre-Shared Key (WPA / IEEE 802.11i/D3.0) (Default)

  • WPA2 Personal: Wi-Fi Protected Access Pre-Shared Key (WPA2 / IEEE 802.11i/RSN)

  • WPA3 Personal: Wi-Fi Protected Access SAE (Simultaneous Authentication of Equals) 



Network key

WPA network key/passphrase as set at the dial-in point. This is either an ASCII character string with a length of 8...63 or exactly 64 hexadecimal digits.



Data encryption

  • Default: The default value depends on which network authentication method is selected - TKIP for WPA, AES (CCMP) for WPA2. (Default)

  • TKIP: Temporal Key Integrity Protocol (IEEE 802.11i/D7.0)

  • AES (CCMP): AES in Counter mode with CBC-MAC (RFC 3610, IEEE 802.11i/D7.0)

  • AES (CCMP) + TKIP: One of two encryption methods is selected by the access point.

  • Automatic: The access point can choose the encryption method freely – nothing is stipulated.



AP scan mode

Scan mode for access points.

  • Default (Default)

  • Broadcast: Alternative for access points which allow the SSID broadcast

  • No broadcast: Alternative for access points which refuse the SSID broadcast (hidden access points)

For WPA/WPA2 Enterprise Encryption

Network authentication

  • WPA Enterprise: Wi-Fi Protected Access with 802.1X authentication (WPA / IEEE 802.11i/D3.0)

  • WPA2 Enterprise: Wi-Fi Protected Access with 802.1X authentication (WPA2/IEEE 802.11i/RSN)



Data encryption

  • Default: The default value depends on which network authentication method is selected - TKIP for WPA, AES (CCMP) for WPA2. (Default)

  • TKIP: Temporal Key Integrity Protocol (IEEE 802.11i/D7.0)

  • AES (CCMP): AES in Counter mode with CBC-MAC (RFC 3610, IEEE 802.11i/D7.0)

  • AES (CCMP) + TKIP: One of two encryption methods is selected by the access point.

  • Automatic: The access point can choose the encryption method freely – nothing is stipulated.



AP scan mode

Scan mode for access points

  • Default (Default)

  • Broadcast: Alternative for access points which allow the SSID broadcast

  • No broadcast: Alternative for access points which refuse the SSID broadcast (hidden access points)



EAP type

  • PEAP: Protected Extensible Authentication Protocol

  • TLS: Transport Layer Security with client certificate

  • TTLS: Tunneled Transport Layer Security

  • FAST: Flexible Authentication via Secure Tunneling



Anonymous identity

This identity is sent by authentication instead of the actual Identity. This prevents the disclosure of the actual identity of the user. The anonymous identity is relevant for any of the above-mentioned EAP Types, except for TLS.



Auth method

Method for authentication that is available for the selected EAP type.
Possible options:

  • MSCHAPv2: Microsoft Challenge Handshake Authentication Protocol (Default)

  • TLS: Transport Layer Security with client certificate

  • GTC: Generic Token Card

  • MD5: MD5-Challenge

  • PAP: Password Authentication Protocol



Validate server certificate

 The endpoint device validates the authenticity of the authentication server against the certificate file. This certificate file is stored under the path defined by CA root certificate.

 The authenticity of the authentication server is not validated.



CA root certificate

Path and file name of the file that contains the certificates with which the authentication server authenticates itself.



Identity

User name that is stored at the authentication server



Password

Password relevant to the user name



The following settings are relevant if you have selected TLS as EAP type:



Manage certificates with SCEP (NDES)

 Client certificates will automatically be managed with SCEP. For more information on SCEP configuration, see (12.1-en) SCEP Client (NDES).

 Client certificates will not be managed with SCEP. (Default)



Client certificate

Path to the file with the certificate for client authentication in the PEM (base64) or DER format.

If a private key in the PKCS#12 (PFX) format is used, leave this field empty.



Private key

Path to the file with the private key for the client certificate. The file can be in the PEM (base64), DER, or PKCS#12 (PFX) format. The Private key password may be required for access.



Identity

User name for network access



Private key password

Password for the Private key for the client certificate



The following setting is relevant if you have selected FAST as EAP type:



Automatic PAC provisioning

Specifies how the PAC (Protected Access Credential) is delivered to the client. 
Possible options:

  • Disabled: PAC files have to be transferred to the device manually, e.g. via UMS file transfer.

  • Unauthenticated:  An anonymous tunnel will be used for PAC provisioning. 

  • Authenticated: An authenticated tunnel will be used for PAC provisioning.

  • Unrestricted: Both authenticated and unauthenticated PAC provisioning is allowed. PAC files are automatically created after the first successful authentication. (Default)

PAC files are stored in /wfs/eap_fast_pacs/.

PAC file names are automatically derived from the Identity, but are coded. In the case of the manual PAC provisioning, you can determine the PAC file names with the following script: /bin/gen_pac_filename.sh