Configuring The Client Adapter
Configuring The Client Adapter
This chapter explains how to set the configuration parameters for a specific profile.
The following topics are covered in this chapter:
• Overview, page 5-2
• Setting System Parameters, page 5-3
• Setting RF Network Parameters, page 5-7
• Setting Advanced Infrastructure Parameters, page 5-14
• Setting Advanced Ad Hoc Parameters, page 5-18
• Setting Network Security Parameters, page 5-21
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
OL-1394-08 5-1
Overview
When you choose to create a new profile or edit an existing profile on the Profile Manager screen, the
Properties screens appear with the name of your profile in parentheses. These screens enable you to set
the configuration parameters for that profile.
Note If you do not change any of the configuration parameters, the default values are used.
Note If you are planning to set parameters on more than one of the Properties screens, wait until you are
finished with all of the screens before clicking OK. When you click OK, you are returned to the Profile
Manager screen.
Each of the Properties screens (listed below) contains parameters that affect a specific aspect of the client
adapter:
• System Parameters—Prepares the client adapter for use in a wireless network
• RF Network—Controls how the client adapter transmits and receives data
• Advanced (Infrastructure)—Controls how the client adapter operates within an infrastructure
network
• Advanced (Ad Hoc)—Controls how the client adapter operates within an ad hoc (peer-to-peer)
network
• Network Security—Controls how a client adapter associates to an access point, authenticates to the
wireless network, and encrypts and decrypts data
Table 5-1 enables you to quickly locate the instructions for setting each Properties screen’s parameters.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
5-2 OL-1394-08
Table 5-2 lists and describes the client adapter’s system parameters. Follow the instructions in the table
to change any parameters.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
OL-1394-08 5-3
Parameter Description
Client Name A logical name for your workstation. It allows an administrator to
determine which devices are connected to the access point without
having to memorize every MAC address. This name is included in the
access point’s list of connected devices.
Range: You can key in up to 16 ASCII characters
Default: A blank field
Note Each computer on the network should have a unique client
name.
SSID1 The service set identifier (SSID) identifies the specific wireless
network that you want to access.
Range: You can key in up to 32 ASCII characters (case sensitive)
Default: A blank field
Note If you leave this parameter blank, your client adapter can
associate to any access point on the network that is configured
to allow broadcast SSIDs (see the AP Radio Hardware page in
the access point management system). If the access point with
which the client adapter is to communicate is not configured to
allow broadcast SSIDs, the value of this parameter must match
the SSID of the access point. Otherwise, the client adapter is
unable to access the network.
SSID2 An optional SSID that identifies a second distinct network and enables
you to roam to that network without having to reconfigure your client
adapter.
Range: You can key in up to 32 ASCII characters (case sensitive)
Default: A blank field
Note If a profile specifies more than one SSID, it cannot be included
in auto profile selection.
Note This field is unavailable for any profiles that are included in
auto profile selection.
SSID3 An optional SSID that identifies a third distinct network and enables
you to roam to that network without having to reconfigure your client
adapter.
Range: You can key in up to 32 ASCII characters (case sensitive)
Default: A blank field
Note If a profile specifies more than one SSID, it cannot be included
in auto profile selection.
Note This field is unavailable for any profiles that are included in
auto profile selection.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
5-4 OL-1394-08
Parameter Description
Power Save Mode Sets your client adapter to its optimum power consumption setting.
Options: CAM, Max PSP, or Fast PSP
Default: CAM (Constantly Awake Mode)
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
OL-1394-08 5-5
Parameter Description
Network Type Specifies the type of network in which your client adapter is installed.
Options: Ad Hoc or Infrastructure
Default: Infrastructure
Go to the next section to set additional parameters or click OK to return to the Profile Manager screen.
On the Profile Manager screen, click OK or Apply to save your changes.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
5-6 OL-1394-08
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
OL-1394-08 5-7
Table 5-3 lists and describes the client adapter’s RF network parameters. Follow the instructions in the
table to change any parameters.
Parameter Description
Data Rate Specifies the rate at which your client adapter should transmit or
receive packets to or from access points (in infrastructure mode) or
other clients (in ad hoc mode).
Auto Rate Selection is recommended for infrastructure mode; setting a
specific data rate is recommended for ad hoc mode.
Options: Auto Rate Selection, 1 Mbps Only, 2 Mbps Only, 5.5 Mbps
Only, or 11 Mbps Only (2.4-GHz client adapters);
Auto Rate Selection, 6 Mbps Only, 9 Mbps Only, 12 Mbps
Only, 18 Mbps Only, 24 Mbps Only, 36 Mbps Only, 48 Mbps
Only, or 54 Mbps Only (5-GHz client adapters)
Default: Auto Rate Selection
Data Rate
2.4-GHz Client 5-GHz Client
Description
Adapters Adapters
Auto Rate Auto Rate Uses the 11-Mbps (for 2.4-GHz client
Selection Selection adapters) or 54-Mbps (for 5-GHz client
adapters) data rate when possible but
drops to lower rates when necessary.
1 Mbps 6 Mbps Offers the greatest range but the lowest
Only Only throughput.
2 Mbps 9 Mbps Progressively offers less range but greater
Only and Only to 48 throughput than the 1 Mbps Only (for
5.5 Mbps Mbps Only 2.4-GHz client adapters) or 6 Mbps Only
Only (for 5-GHz client adapters) option.
11 Mbps 54 Mbps Offers the greatest throughput but the
Only Only lowest range.
Note Your client adapter’s data rate must be set to Auto Rate
Selection or must match the data rate of the access point (in
infrastructure mode) or the other clients (in ad hoc mode) with
which it is to communicate. Otherwise, your client adapter may
not be able to associate to them.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
5-8 OL-1394-08
Parameter Description
Use Short Radio Headers Checking this check box sets your client adapter to use short radio
headers. However, the adapter can use short radio headers only if the
access point is also configured to support them and is using them. If any
clients associated to an access point are using long headers, then all
clients in that cell must also use long headers, even if both this client
and the access point have short radio headers enabled.
Short radio headers improve throughput performance; long radio
headers ensure compatibility with clients and access points that do not
support short radio headers.
Default: Checked
Note This parameter is available only for 2.4-GHz client adapters.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
OL-1394-08 5-9
Parameter Description
Channel Specifies the frequency that your client adapter will use as the channel
for communications. These channels conform to the IEEE 802.11
Standard for your regulatory domain.
• In infrastructure mode, this parameter is set automatically and
cannot be changed. The client adapter listens to the entire
spectrum, selects the best access point to associate to, and uses the
same frequency as that access point.
• In ad hoc mode, the channel of the client adapter must be set to
match the channel used by the other clients in the wireless network.
If the client adapter does not find any other ad hoc adapters, this
parameter specifies the channel with which the adapter will start its
cell.
Range: Dependent on client adapter radio and regulatory domain
Example for 2.4-GHz client adapters:
1 to 11 (2412 to 2462 MHz) in North America
Example for 5-GHz client adapters:
36, 40, 44, 48, 52, 56, 60, and 64 (5180, 5200, 5220, 5240,
5260, 5280, 5300, and 5320 MHz) in North America
Default: Dependent on client adapter radio and regulatory domain
Example for 2.4-GHz client adapters:
6 (2437 MHz) in North America
Example for 5-GHz client adapters:
36 (5180 MHz) in North America
Note Refer to Appendix D for a list of channel identifiers, channel
center frequencies, and regulatory domains for each channel.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
5-10 OL-1394-08
Parameter Description
Transmit Power Defines the power level at which your client adapter transmits. This
value must not be higher than that allowed by your country’s regulatory
agency (FCC in the U.S., DOC in Canada, ETSI in Europe, MKK in
Japan, etc.).
Options: Dependent on the power table programmed into the client
adapter; see the table below
Default: The maximum power level programmed into the client
adapter and allowed by your country’s regulatory agency
Note If you are using an older version of a 340 or 350 series client
adapter, your power level options may be different than those
listed here.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
OL-1394-08 5-11
Parameter Description
Clear Channel Assessment Specifies the method that determines whether the channel on which
your client adapter will operate is clear prior to the transmission of
data.
Options: Firmware Default (XXX), Carrier/Correlation (Car/Cor),
Energy Detect (ED), or ED or Car/Cor
Default: Firmware Default (XXX)
Method Description
Firmware Default (XXX) The Clear Channel Assessment (CCA)
mechanism will report that the channel is
busy based on the default value of the
client adapter’s firmware. The firmware’s
CCA default value is shown in
parentheses.
Note The CCA default value for PCM,
LMC, and PCI card firmware is
Car/Cor; the default value for mini
PCI card firmware is ED.
Carrier/Correlation The CCA mechanism will report that the
(Car/Cor) channel is busy upon detection of a
direct-sequence spread spectrum (DSSS)
signal. This signal may be above or below
the ED threshold.
Energy Detect (ED) The CCA mechanism will report that the
channel is busy upon detection of any
energy above the ED threshold.
ED or Car/Cor The CCA mechanism will report that the
channel is busy upon detection of a DSSS
signal or any energy above the ED
threshold.
Note This parameter is available only for 2.4-GHz client adapters.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
5-12 OL-1394-08
Parameter Description
Data Retries Defines the number of times a packet is resent if the initial transmission
is unsuccessful.
Range: 1 to 128
Default: 16 (2.4-GHz client adapters) or 32 (5-GHz client adapters)
Note If your network protocol performs its own retries, set this to a
smaller value than the default. This way notification of a “bad”
packet is sent up the protocol stack quickly so the application
can retransmit the packet if necessary.
Fragment Threshold Defines the threshold above which an RF data packet is split up or
fragmented. If one of those fragmented packets experiences
interference during transmission, only that specific packet would need
to be resent.
Throughput is generally lower for fragmented packets because the fixed
packet overhead consumes a higher portion of the RF bandwidth.
Range: 256 to 2312
Default: 2312
Go to the next section to set additional parameters or click OK to return to the Profile Manager screen.
On the Profile Manager screen, click OK or Apply to save your changes.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
OL-1394-08 5-13
The Advanced (Infrastructure) screen (see Figure 5-3) enables you to set parameters that control how the
client adapter operates within an infrastructure network. To access this screen, choose the Advanced
(Infrastructure) tab from the Properties screens.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
5-14 OL-1394-08
Table 5-4 lists and describes the client adapter’s advanced infrastructure parameters. Follow the
instructions in the table to change any parameters.
Parameter Description
Antenna Mode (Receive) Specifies the antenna that your client adapter uses to receive data.
• PC card—The PC card’s integrated, permanently attached
antenna operates best when used in diversity mode. Diversity
mode allows the card to use the better signal from its two antenna
ports.
Options: Diversity (Both), Primary Antenna Only, Secondary
Antenna Only
Default: Diversity (Both)
• LM card—The LM card is shipped without an antenna; however,
an antenna can be connected through the card’s external
connector. If a snap-on antenna is used, diversity mode is
recommended. Otherwise, choose the mode that corresponds to
the antenna port to which the antenna is connected.
Options: Diversity (Both), Primary Antenna Only, Secondary
Antenna Only
Default: Diversity (Both)
• PCI card—The PCI card must use the Primary Antenna Only
option.
Default: Primary Antenna Only
• Mini PCI card—The mini PCI card, which can be used with one
or two antennas, operates best in diversity mode. Diversity mode
allows the card to use the better signal from its two antenna
connectors.
Options: Diversity (Both), Primary Antenna Only, Secondary
Antenna Only
Default: Diversity (Both)
Note This parameter is available only for 2.4-GHz client adapters.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
OL-1394-08 5-15
Parameter Description
Specified Access Point 1- 4 Specifies the MAC addresses of up to four preferred access points
with which the client adapter can associate. If the specified access
points are not found or the client adapter roams out of range, the
adapter may associate to another access point.
You can enter the MAC addresses of the access points in the edit boxes
or choose not to specify access points by leaving the boxes blank.
Default: Blank fields
Note This parameter should be used only for access points that are
in repeater mode. For normal operation, leave these fields
blank because specifying an access point slows down the
roaming process.
RTS Threshold Specifies the size of the data packet that the low-level RF protocol
issues to a request-to-send (RTS) packet.
Setting this parameter to a small value causes RTS packets to be sent
more often. When this occurs, more of the available bandwidth is
consumed and the throughput of other network packets is reduced, but
the system is able to recover faster from interference or collisions,
which may be caused from a high multipath environment
characterized by obstructions or metallic surfaces.
Range: 0 to 2312
Default: 2312
Note Refer to the IEEE 802.11 Standard for more information on
the RTS/CTS mechanism.
RTS Retry Limit Specifies the number of times the client adapter resends a
request-to-send (RTS) packet if it does not receive a clear-to-send
(CTS) packet from the previously sent RTS packet.
Setting this parameter to a large value decreases the available
bandwidth whenever interference is encountered but makes the system
more immune to interference and collisions, which may be caused
from a high multipath environment characterized by obstructions or
metallic surfaces.
Range: 1 to 128
Default: 16 (2.4-GHz client adapters) or 32 (5-GHz client adapters)
Note Refer to the IEEE 802.11 Standard for more information on
the RTS/CTS mechanism.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
5-16 OL-1394-08
Parameter Description
Enable Radio Management Checking this check box enables the access point to which the client
Support adapter is associated to control the use of radio management (RM),
provided RM is enabled on the access point. RM is a system-wide
feature that involves multiple infrastructure nodes. The RM feature on
the access point acts on radio measurement requests from other
network devices to instruct the access point and its associated clients
to perform required radio measurements and then report them.
Default: Checked
Note This parameter is available in Install Wizard version 1.2 or
later for 350 series cards and Install Wizard version 1.3 or
later for CB20A cards.
Note Access points must use Cisco IOS Release 12.2(13)JA or later
to enable RM. Refer to the documentation for your access
point for instructions on enabling this feature.
Go to the next section to set additional parameters or click OK to return to the Profile Manager screen.
On the Profile Manager screen, click OK or Apply to save your changes.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
OL-1394-08 5-17
The Advanced (Ad Hoc) screen (see Figure 5-4) enables you to set parameters that control how the client
adapter operates within an ad hoc network. To access this screen, choose the Advanced (Ad Hoc) tab
from the Properties screens.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
5-18 OL-1394-08
Table 5-5 lists and describes the client adapter’s advanced ad hoc parameters. Follow the instructions in
the table to change any parameters.
Parameter Description
Antenna Mode (Receive) Specifies the antenna that your client adapter uses to receive data.
• PC card—The PC card’s integrated, permanently attached
antenna operates best when used in diversity mode. Diversity
mode allows the card to use the better signal from its two antenna
ports.
Options: Diversity (Both), Primary Antenna Only, Secondary
Antenna Only
Default: Diversity (Both)
• LM card—The LM card is shipped without an antenna; however,
an antenna can be connected through the card’s external
connector. If a snap-on antenna is used, diversity mode is
recommended. Otherwise, choose the mode that corresponds to
the antenna port to which the antenna is connected.
Options: Diversity (Both), Primary Antenna Only, Secondary
Antenna Only
Default: Diversity (Both)
• PCI card—The PCI card must use the Primary Antenna Only
option.
Default: Primary Antenna Only
• Mini PCI card—The mini PCI card, which can be used with one
or two antennas, operates best in diversity mode. Diversity mode
allows the card to use the better signal from its two antenna
connectors.
Options: Diversity (Both), Primary Antenna Only, Secondary
Antenna Only
Default: Diversity (Both)
Note This parameter is available only for 2.4-GHz client adapters.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
OL-1394-08 5-19
Parameter Description
RTS Threshold Specifies the size of the data packet that the low-level RF protocol
issues to a request-to-send (RTS) packet.
Setting this parameter to a small value causes RTS packets to be sent
more often. When this occurs, more of the available bandwidth is
consumed and the throughput of other network packets is reduced, but
the system is able to recover faster from interference or collisions,
which may be caused from a high multipath environment
characterized by obstructions or metallic surfaces.
Range: 0 to 2312
Default: 2312
Note Refer to the IEEE 802.11 Standard for more information on
the RTS/CTS mechanism.
RTS Retry Limit Specifies the number of times the client adapter resends a
request-to-send (RTS) packet if it does not receive a clear-to-send
(CTS) packet from the previously sent RTS packet.
Setting this parameter to a large value decreases the available
bandwidth whenever interference is encountered but makes the system
more immune to interference and collisions, which may be caused
from a high multipath environment characterized by obstructions or
metallic surfaces.
Range: 1 to 128
Default: 16 (2.4-GHz client adapters) or 32 (5-GHz client adapters)
Note Refer to the IEEE 802.11 Standard for more information on
the RTS/CTS mechanism.
Wake Duration (Kμs) Specifies the amount of time following a beacon that the client adapter
stays awake to receive announcement traffic indication message
(ATIM) packets, which are sent to the adapter to keep it awake until
the next beacon.
Refer to the Power Save Mode parameter in Table 5-2.
Range: 0 Kμs (in CAM mode); 5 to 60 Kμs (in Max PSP or Fast PSP
mode)
Default: 5 Kμs
Note If your client adapter is set to CAM mode, you must set the
wake duration to 0 Kμs. If your client adapter is set to Max PSP
or Fast PSP mode, you must set the wake duration to a minimum
of 5 Kμs.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
5-20 OL-1394-08
Parameter Description
Beacon Period (Kμs) Specifies the duration between beacon packets, which are used to help
clients find each other in ad hoc mode.
Range: 20 to 976 Kμs
Default: 100 Kμs
Go to the next section to set additional parameters or click OK to return to the Profile Manager screen.
On the Profile Manager screen, click OK or Apply to save your changes.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
OL-1394-08 5-21
This screen is different from the other Properties screens in that it presents several security features, each
of which involves a number of steps. In addition, the security features themselves are complex and need
to be understood before they are implemented. Therefore, this section provides an overview of the
security features as well as procedures for using them.
However, before you determine the appropriate security settings for your client adapter, you must decide
how to set the Allow Association to Mixed Cells parameter, which appears at the bottom of the Network
Security screen and is not associated to any of the security features. See the “Setting the Allow
Association to Mixed Cells Parameter” section below.
Note This parameter is unavailable if the Wi-Fi Protected Access (WPA) check box is checked.
Note For security reasons, Cisco recommends that WEP-enabled and WEP-disabled clients not be
allowed in the same cell because broadcast packets are sent unencrypted, even to clients running
WEP.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
5-22 OL-1394-08
Note Refer to the “Additional WEP Key Security Features” section on page 5-29 for information on three
security features that can make your WEP keys even more secure.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
OL-1394-08 5-23
LEAP is enabled or disabled for a specific profile through ACU, provided the LEAP security module
was selected during installation. After LEAP is enabled, a variety of configuration options are
available, including how and when a username and password are entered to begin the authentication
process.
The username and password are used by the client adapter to perform mutual authentication with the
RADIUS server through the access point. The username and password need to be re-entered each
time the client adapter is inserted or the Windows device is rebooted, unless you configure your
adapter to use saved LEAP credentials.
Note If the LEAP security module was not selected during installation, the LEAP option is
unavailable in ACU. If you want to be able to enable and disable LEAP, you must run the
installation program again and choose LEAP.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
5-24 OL-1394-08
Note PACs are also stored globally on computers that use the Novell Network login prompt
or any other third-party login application that does not share its credentials with the
EAP-FAST supplicant.
EAP-FAST authentication is designed to support the following user databases over a wireless LAN:
– Cisco Secure ACS internal user database
– Cisco Secure ACS ODBC user database
– Windows NT/2000/2003 domain user database
– LDAP user database
LDAP user databases (such as NDS) support only manual PAC provisioning while the other three
user databases support both automatic and manual PAC provisioning.
Note If the EAP-FAST security module was not selected during installation, the EAP-FAST
option is unavailable in ACU. If you want to be able to enable and disable EAP-FAST, you
must run the installation program again and choose EAP-FAST. EAP-FAST is supported in
Install Wizard version 1.3 and later.
• Host Based EAP—Choosing this option enables you to use any 802.1X authentication type for
which your operating system has support. For example, if your operating system uses the Microsoft
802.1X supplicant, it provides native support for EAP-TLS authentication and general support for
PEAP and EAP-SIM authentication.
Note To use EAP-TLS, PEAP, or EAP-SIM authentication, you must install the Microsoft 802.1X
supplicant, ACU, and the PEAP or EAP-SIM supplicant; configure your client adapter using
ACU; enable the authentication type in Windows; and enable Network-EAP on the access
point.
– EAP-TLS—EAP-TLS is enabled or disabled through the operating system and uses a dynamic
session-based WEP key, which is derived from the client adapter and RADIUS server, to encrypt
data. Once enabled, a few configuration parameters must be set within the operating system.
RADIUS servers that support EAP-TLS authentication include Cisco Secure ACS version 3.0
or later and Cisco Access Registrar version 1.8 or later.
Note EAP-TLS requires the use of a certificate. Refer to Microsoft’s documentation for
information on downloading and installing the certificate.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
OL-1394-08 5-25
RADIUS servers that support PEAP authentication include Cisco Secure ACS version 3.1 or
later and Cisco Access Registrar version 3.5 or later.
Note Windows XP Service Pack 1 and the Microsoft 802.1X supplicant for Windows 2000
include Microsoft’s PEAP supplicant, which supports a Windows username and
password only and does not interoperate with Cisco’s PEAP supplicant. To use Cisco’s
PEAP supplicant, install the Install Wizard file after Windows XP Service Pack 1 or the
Microsoft 802.1X supplicant for Windows 2000. Otherwise, Cisco’s PEAP supplicant
is overwritten by Microsoft’s PEAP supplicant.
– EAP-SIM—EAP-SIM authentication is designed for use in public wireless LANs and requires
clients equipped with PCSC-compliant smartcard readers. The EAP-SIM supplicant included in
the Install Wizard file supports only Gemplus SIM+ cards; however, an updated supplicant is
available that supports standard GSM-SIM cards as well as more recent versions of the
EAP-SIM protocol. The new supplicant is available for download from Cisco.com at the
following URL:
http://www.cisco.com/cgi-bin/tablebuild.pl/access-registrar-encrypted
Please note that the above requirements are necessary but not sufficient to successfully perform
EAP-SIM authentication. Typically, you are also required to enter into a service contract with
a WLAN service provider, who must support EAP-SIM authentication in its network. Also,
while your PCSC smartcard reader may be able to read standard GSM-SIM cards or chips,
EAP-SIM authentication usually requires your GSM cell phone account to be provisioned for
WLAN service by your service provider.
EAP-SIM is enabled or disabled through the operating system and uses a dynamic session-based
WEP key, which is derived from the client adapter and RADIUS server, to encrypt data.
EAP-SIM requires you to enter a user verification code, or PIN, for communication with the
SIM card. You can choose to have the PIN stored in your computer or to be prompted to enter
it after a reboot or prior to every authentication attempt.
RADIUS servers that support EAP-SIM include Cisco Access Registrar version 3.0 or later.
Note Because EAP-TLS, PEAP, and EAP-SIM authentication are enabled in the operating system
and not in ACU, you cannot switch between these authentication types simply by switching
profiles in ACU. You can create a profile in ACU that uses host-based EAP, but you must
enable the specific authentication type in Windows (provided Windows uses the Microsoft
802.1X supplicant). In addition, Windows can be set for only one authentication type at a
time; therefore, if you have more than one profile in ACU that uses host-based EAP and you
want to use another authentication type, you must change authentication types in Windows
after switching profiles in ACU.
When you enable Network-EAP or EAP on your access point and configure your client adapter for
LEAP, EAP-FAST, EAP-TLS, PEAP, or EAP-SIM, authentication to the network occurs in the following
sequence:
1. The client associates to an access point and begins the authentication process.
Note The client does not gain full access to the network until authentication between the client
and the RADIUS server is successful.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
5-26 OL-1394-08
2. Communicating through the access point, the client and RADIUS server complete the authentication
process, with the password (LEAP and PEAP), password and PAC (EAP-FAST), certificate
(EAP-TLS), or internal key stored on the SIM card and in the service provider’s Authentication
Center (EAP-SIM) being the shared secret for authentication. The password, PAC, or internal key is
never transmitted during the process.
3. If authentication is successful, the client and RADIUS server derive a dynamic, session-based WEP
key that is unique to the client.
4. The RADIUS server transmits the key to the access point using a secure channel on the wired LAN.
5. For the length of a session, or time period, the access point and the client use this key to encrypt or
decrypt all unicast packets (and broadcast packets if the access point is set up to do so) that travel
between them.
Refer to one of these sections for instructions on enabling EAP authentication:
• Enabling LEAP, page 5-38
• Enabling EAP-FAST, page 5-42
• Enabling Host-Based EAP, page 5-49
Note Refer to the IEEE 802.11 Standard for more information on 802.1X authentication and to the following
URL for additional information on RADIUS servers:
http://www.cisco.com/univercd/cc/td/doc/product/software/ios120/12cgcr/secur_c/scprt2/scrad.htm
Note Meetinghouse AEGIS Client supplicant version 2.1 or later is also supported for use with
Windows 2000 and XP; however, it was not tested with this client adapter software release.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
OL-1394-08 5-27
The software components included in Install Wizard version 1.3 or later automatically support WPA
migration mode. WPA migration mode is an access point setting that enables both WPA and non-WPA
clients to associate to the access point using the same SSID.
Refer to one of these sections for instructions on enabling EAP authentication with WPA:
• Enabling LEAP, page 5-38
• Enabling EAP-FAST, page 5-42
• Enabling Host-Based EAP, page 5-49
Note WPA must also be enabled on the access point. Access points must use Cisco IOS Release 12.2(11)JA
or later to enable WPA. Refer to the documentation for your access point for instructions on enabling
this feature.
Note Access points must use Cisco IOS Release 12.2(11)JA or later to enable fast roaming. Refer to the
documentation for your access point for instructions on enabling this feature.
Note If the Microsoft 802.1X supplicant is installed on your computer, you must disable one or two Windows
parameters in order for this feature to operate correctly. Refer to Step 13 in the “Enabling LEAP” section
or Step 15 in the “Enabling EAP-FAST” section for details.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
5-28 OL-1394-08
Note This feature does not need to be enabled on the client adapter or access point; it is supported
automatically in the firmware of both devices. However, both the client and access point must use these
firmware versions or later.
Note Access point firmware version 11.10T or later is required to enable these security features. Refer to the
documentation for your access point for instructions on enabling these security features.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
OL-1394-08 5-29
MIC prevents bit-flip attacks on encrypted packets. During a bit-flip attack, an intruder intercepts an
encrypted message, alters it slightly, and retransmits it, and the receiver accepts the retransmitted
message as legitimate. The MIC adds a few bytes to each packet to make the packets tamper-proof.
The Status screen indicates if MIC is being used, and the Statistics screen provides MIC statistics.
Note If you enable MIC on the access point, your client adapter’s driver must support these features;
otherwise, the client cannot associate.
This feature, also referred to as WEP key hashing, defends against an attack on WEP in which the
intruder uses the initialization vector (IV) in encrypted packets to calculate the WEP key. TKIP removes
the predictability that an intruder relies on to determine the WEP key by exploiting IVs. It protects both
unicast and broadcast WEP keys.
Note If you enable TKIP on the access point, your client adapter’s firmware must support these features;
otherwise, the client cannot associate.
Note TKIP is automatically enabled whenever WPA is enabled, and it is disabled whenever WPA is disabled.
EAP authentication provides dynamic unicast WEP keys for client devices but uses static broadcast, or
multicast, keys. When you enable broadcast WEP key rotation, the access point provides a dynamic
broadcast WEP key and changes it at the interval you choose. When you enable this feature, only
wireless client devices using LEAP, EAP-FAST, EAP-TLS, PEAP, or EAP-SIM authentication can
associate to the access point. Client devices using static WEP (with open or shared key authentication)
cannot associate.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
5-30 OL-1394-08
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
OL-1394-08 5-31
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
5-32 OL-1394-08
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
OL-1394-08 5-33
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
5-34 OL-1394-08
Step 1 Choose None under Network Authentication on the Network Security screen.
Step 2 Choose Static WEP under Data Encryption.
Step 3 Click the Static WEP Keys button. The Static WEP Keys screen appears (see Figure 5-6).
Note ASCII text WEP keys are not supported on the Cisco Aironet 1200 Series Access Points, so
you must choose the Hexadecimal (0-9, A-F) option if you are planning to use your client
adapter with these access points.
Step 5 For the static WEP key that you are entering (1, 2, 3, or 4), choose a WEP key size of 40 or 128 on the
right side of the screen. 128-bit client adapters can use 40- or 128-bit keys, but 40-bit adapters can use
only 40-bit keys. If 128 bit is not supported by the client adapter, this option is unavailable.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
OL-1394-08 5-35
Step 6 Obtain the static WEP key from your system administrator and enter it in the blank field for the key you
are creating. Follow the guidelines below to enter a new static WEP key:
• WEP keys must contain the following number of characters:
– 10 hexadecimal characters or 5 ASCII text characters for 40-bit keys
Example: 5A5A313859 (hexadecimal) or ZZ18Y (ASCII)
– 26 hexadecimal characters or 13 ASCII text characters for 128-bit keys
Example: 5A583135333554595549333534 (hexadecimal) or ZX1535TYUI354 (ASCII)
Note You must enter hexadecimal characters for 5-GHz client adapters if these adapters will be
used with Cisco Aironet 1200 Series Access Points.
• Your client adapter’s WEP key must match the WEP key used by the access point (in infrastructure
mode) or clients (in ad hoc mode) with which you are planning to communicate.
• When setting more than one WEP key, the keys must be assigned to the same WEP key numbers for
all devices. For example, WEP key 2 must be WEP key number 2 on all devices. When multiple
WEP keys are set, they must be in the same order on all devices.
Note After you enter a WEP key, you can write over it, but you cannot edit or delete it.
Step 7 Click the Transmit Key button to the left of the key you want to use to transmit packets. Only one WEP
key can be selected as the transmit key.
Step 8 Click OK to exit the Static WEP Keys screen and return to the Network Security screen.
Step 9 Choose one of the following access point authentication options, which defines how your client adapter
will attempt to authenticate to an access point:
• Open—Enables your client adapter, regardless of its WEP settings, to authenticate and attempt to
communicate with an access point. Open Authentication is the default setting.
• Shared Key—Enables your client adapter to communicate only with access points that have the
same WEP key. This option is available only if Use Static WEP Keys is selected.
In shared key authentication, the access point sends a known unencrypted “challenge packet” to the
client adapter, which encrypts the packet and sends it back to the access point. The access point
attempts to decrypt the encrypted packet and sends an authentication response packet indicating the
success or failure of the decryption back to the client adapter. If the packet is successfully
encrypted/decrypted, the user is considered to be authenticated.
Note Cisco recommends that shared key authentication not be used because it presents a security
risk.
Step 10 Click OK to return to the Profile Manager screen; then click OK or Apply to save your changes.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
5-36 OL-1394-08
Note You can overwrite existing WEP keys, but you cannot edit or delete them.
Step 1 Click the Static WEP Keys button on the Network Security screen. The Static WEP Keys screen appears
(see Figure 5-6).
Step 2 Look at the current WEP key settings in the middle of the screen. A check mark appears in the Already
Set? box for all existing static WEP keys.
Note For security reasons, the codes for existing static WEP keys do not appear on the screen.
Step 3 Decide which existing static WEP key you want to overwrite.
Step 4 Click within the blank field of that key.
Step 5 Enter a new key, following the guidelines outlined in Step 6 of the “Entering a New Static WEP Key”
section on page 5-35.
Step 6 Make sure the Transmit Key button to the left of your key is selected, if you want this key to be used to
transmit packets.
Step 7 Click OK to exit the Static WEP Keys screen and return to the Network Security screen.
Step 8 Click OK to return to the Profile Manager screen; then click OK or Apply to save your changes.
Note Choosing LEAP or EAP-FAST under Network Authentication on the Network Security screen disables
static WEP automatically.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
OL-1394-08 5-37
Enabling LEAP
Before you can enable LEAP authentication, your network devices must meet the following
requirements:
• Client adapters must support WEP and use the firmware, drivers, utilities, and security modules
included in the Install Wizard file.
• To use WPA, 350 series and CB20A client adapters must use the software included in Install Wizard
version 1.2 or later on a computer running Windows 2000 or XP.
• Access points to which your client adapter may attempt to authenticate must use the following
firmware versions or later: 11.23T (340 and 350 series access points), 11.54T (1200 series access
points), or Cisco IOS Release 12.2(4)JA (1100 series access points).
Note To use WPA or fast roaming (CCKM), access points must use Cisco IOS Release 12.2(11)JA
or later. To use the Reporting Access Points That Fail LEAP or EAP-FAST Authentication
and Fast Roaming features, access points must use the firmware versions listed on page 5-31.
• All necessary infrastructure devices such as access points and servers must be properly configured
for LEAP authentication.
Note Cisco recommends the use of strong passwords for LEAP authentication in order to minimize the risk of
successful attacks by rogue access points. Refer to the “Creating Strong Passwords” section on
page 10-13 for tips on creating strong passwords.
Step 1 Check the Wi-Fi Protected Access (WPA) check box under Network Authentication on the Network
Security screen if you want to enable WPA. This parameter enables the client adapter to associate to
access points using WPA.
Note WPA is not supported on Cisco Aironet 340 series client adapters.
Note Refer to the “Wi-Fi Protected Access (WPA)” section on page 5-27 for additional information.
Note This option is available only if you chose the LEAP security module during installation.
Note When you choose this option, dynamic WEP (if WPA is disabled) or TKIP (if WPA is enabled)
is set automatically.
Step 3 Click the Configure button. The LEAP Settings screen appears (see Figure 5-7).
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
5-38 OL-1394-08
Step 4 Choose one of the following LEAP username and password setting options:
• Use Temporary User Name and Password—Requires you to enter the LEAP username and
password each time the computer reboots in order to authenticate and gain access to the network.
• Use Saved User Name and Password—Does not require you to enter a LEAP username and
password each time the computer reboots. Authentication occurs automatically as needed using a
saved username and password (which are registered with the RADIUS server).
Note The Use Saved User Name and Password option is available only if the Allow Saved LEAP
User Name and Password option was enabled (set to Yes) during installation.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
OL-1394-08 5-39
Note Usernames are limited to 64 ASCII characters in the software included in Install Wizard
version 1.3 or later and to 32 ASCII characters in previous Install Wizard versions.
Passwords are limited to 32 ASCII characters. However, if a domain name is entered in
the Domain field, the sum of the username and domain name is limited to 63 ASCII
characters in the software included in Install Wizard version 1.3 or later and to 31
characters in previous Install Wizard versions.
Note If you are using the software included in Install Wizard version 1.3 or later, you can
include the domain name in the User Name field as follows: [email protected]
(provided that your RADIUS server supports this format). A maximum of 64 ASCII
characters can be entered for the [email protected] string. If you include the
domain name in the User Name field, the Domain field becomes disabled.
Step 6 If you work in an environment with multiple domains and, therefore, want your Windows login domain
to be passed to the RADIUS server along with your username, check the Include Windows Logon
Domain with User Name check box. The default setting is checked.
Note If you selected to use a saved username and password but do not check the Include Windows
Logon Domain with User Name check box, the Domain field becomes unavailable, and a
domain name is not passed to the RADIUS server.
Step 7 If you want to force the client adapter to disassociate after you log off so that another user cannot gain
access to the wireless network using your credentials, check the No Network Connection Unless User
Is Logged In check box. The default setting is checked.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
5-40 OL-1394-08
Step 8 In the Authentication Timeout Value field, enter the amount of time (in seconds) before a LEAP
authentication attempt is considered to be failed and an error message appears.
Range: 10 to 300 seconds
Default: 90 seconds
Step 9 Click OK to exit the LEAP Settings screen.
Step 10 Check the Allow Fast Roaming (CCKM) check box on the Network Security screen if you want to
enable fast roaming for your client adapter.
• Checking this check box enables the client adapter to use CCKM when associated to an access point
that uses CCKM or to associate to access points that are not using CCKM.
• Unchecking this check box prevents the client adapter from using CCKM even with access points
that use it.
Default: Unchecked
Note Refer to the “Fast Roaming (CCKM)” section on page 5-28 for additional information.
Step 11 Check the Allow Association to both WPA and non-WPA authenticators check box if you want to
allow the client adapter to associate to access points that are configured for LEAP authentication with:
• WPA enabled (associates with WPA security)
• WPA disabled or not supported (associates without WPA security)
• Cisco migration mode, where WPA is optional (associates without WPA security)
If this check box is not checked, the client adapter can associate only to access points that are configured
for LEAP authentication with WPA.
Default: Unchecked
Step 12 Click OK to exit the Network Security screen and return to the Profile Manager screen. On the Profile
Manager screen, click OK or Apply to save your changes.
Step 13 Follow these steps if the Microsoft 802.1X supplicant is installed on your computer and you want to take
advantage of the fast roaming feature:
a. Perform one of the following steps, depending on your computer’s operating system:
– If your computer is running Windows 98, 98 SE, NT, or Me, run the Microsoft 802.1X
Authentication Client application. Then go to Step c.
– If your computer is running Windows 2000, double-click My Computer, Control Panel, and
Network and Dial-up Connections. Right-click Local Area Connection. Click Properties.
The Local Area Connection Properties screen appears.
– If your computer is running Windows XP, double-click My Computer, Control Panel, and
Network Connections. Right-click Wireless Network Connection. Click Properties. The
Wireless Network Connection Properties screen appears. Choose the Wireless Networks tab.
Uncheck the Use Windows to configure my wireless network settings check box unless you
are using Windows XP Service Pack 1.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
OL-1394-08 5-41
Note In Windows Service Pack 1, the Authentication tab has moved from its previous location. To
access it, make sure the Use Windows to configure my wireless network settings check
box is checked. Click the SSID of the profile you are creating from the list of available
networks and click Configure. If your profile’s SSID is not listed, click Add, enter your
profile’s SSID in the Network name (SSID) field, and choose the Authentication tab.
c. Uncheck the Enable network access control using IEEE 802.1X or Enable IEEE 802.1x
authentication for this network check box.
d. Click OK to save your settings.
e. If you are using Windows XP Service Pack 1, uncheck the Use Windows to configure my wireless
network settings check box on the Wireless Networks screen and click OK.
Step 14 Refer to Chapter 6 for instructions on authenticating using LEAP.
Enabling EAP-FAST
Before you can enable EAP-FAST authentication, your network devices must meet the following
requirements:
• 350 series and CB20A client adapters must use the software included in Install Wizard version 1.3
or later on a computer running Windows 2000 or XP.
• Access points to which your client adapter may attempt to authenticate must use the following
firmware versions or later: 11.23T (340 and 350 series access points), 11.54T (1200 series access
points), or Cisco IOS Release 12.2(4)JA (1100 series access points).
Note To use WPA or fast roaming (CCKM), access points must use Cisco IOS Release 12.2(11)JA
or later. To use the Reporting Access Points That Fail LEAP or EAP-FAST Authentication
and Fast Roaming features, access points must use the firmware versions listed on page 5-34.
• All necessary infrastructure devices such as access points, servers, gateways, and user databases
must be properly configured for EAP-FAST authentication.
Follow these steps to enable EAP-FAST authentication for this profile.
Step 1 Check the Wi-Fi Protected Access (WPA) check box under Network Authentication on the Network
Security screen if you want to enable WPA. This parameter enables the client adapter to associate to
access points using WPA.
Note Refer to the “Wi-Fi Protected Access (WPA)” section on page 5-27 for additional information.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
5-42 OL-1394-08
Note This option is available only if you selected the EAP-FAST security module during installation.
Note When you choose this option, dynamic WEP (if WPA is disabled) or TKIP (if WPA is enabled)
is set automatically.
Step 3 Click Configure. The EAP-FAST Settings screen appears (see Figure 5-8).
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
OL-1394-08 5-43
Step 4 Choose one of the following EAP-FAST username and password setting options:
• Use Temporary User Name and Password—Requires you to enter the EAP-FAST username and
password each time the computer reboots in order to authenticate and gain access to the network.
• Use Saved User Name and Password—Does not require you to enter an EAP-FAST username and
password each time the computer reboots. Authentication occurs automatically as needed using a
saved username and password (which are registered with the RADIUS server).
Note The Use Saved User Name and Password option is available only if the Allow Saved
EAP-FAST User Name and Password option was enabled (set to Yes) during installation.
Note Usernames are limited to 64 ASCII characters, and passwords are limited to 32 ASCII
characters. However, if a domain name is entered in the Domain field, the sum of the
username and domain name is limited to 63 ASCII characters.
Note If you include the domain name in the User Name field, the Domain field becomes
disabled.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
5-44 OL-1394-08
Step 6 If you work in an environment with multiple domains and therefore want your Windows login domain
to be passed to the RADIUS server along with your username, check the Include Windows Logon
Domain with User Name check box. The default setting is checked.
Note If you chose to use a saved username and password but do not check the Include Windows
Logon Domain with User Name check box, the Domain field becomes unavailable, and a
domain name is not passed to the RADIUS server.
Step 7 If you want to force the client adapter to disassociate after you log off so that another user cannot gain
access to the wireless network using your credentials, check the No Network Connection Unless User
Is Logged In check box. The default setting is checked.
Step 8 In the Authentication Timeout Value field, enter the amount of time (in seconds) before an EAP-FAST
authentication attempt is considered to be failed and an error message appears.
Range: 10 to 300 seconds
Default: 90 seconds
Step 9 Perform one of the following:
• If you want to enable automatic PAC provisioning, check the Allow Automatic PAC Provisioning
for This Profile check box. A protected access credentials (PAC) file is obtained automatically as
needed (for instance, when a PAC expires, when the client adapter accesses a different server, when
the EAP-FAST username cannot be matched to a previously provisioned PAC, etc.). This is the
default setting. If you choose this option, go to Step 11.
• If you want to enable manual PAC provisioning, uncheck the Allow Automatic PAC Provisioning
for This Profile check box. You must choose a PAC authority or manually import a PAC file. If you
choose this option, go to Step 10.
Note The Allow Automatic PAC Provisioning for This Profile option is available only if the Allow
Auto-Provisioning? option was enabled (set to Yes) during installation. If this option is not
available, you must enable manual PAC provisioning.
Note LDAP user databases support only manual PAC provisioning while Cisco Secure ACS internal,
Cisco Secure ODBC, and Windows NT/2000/2003 domain user databases support both
automatic and manual PAC provisioning.
Note Provisioning occurs only upon initial negotiation of the PAC or upon PAC expiration. After the
PAC is provisioned, it serves as the per-user key by which authentication transactions are
secured.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
OL-1394-08 5-45
b. Find the location of the PAC file in the Look in box. The default location is My Documents.
Note If you browse to a different location to obtain the PAC, the new location becomes the
default location going forward.
c. Click the PAC file (*.pac) so that it appears in the File name box at the bottom of the screen.
Note The filename and extension of PAC files is determined by the PAC authority that issues
them, but the standard file extension is pac.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
5-46 OL-1394-08
e. If a message appears indicating that the PAC file you are about to import will be made accessible
to all users of your system, click Yes. If you click No, the PAC file is not imported.
Note The PAC file you are about to import will be made accessible to all users of your system
if your profile is configured for global PACs. Global PACs are enabled when you choose
the Use Saved User Name and Password option, uncheck the No Network Connection
Unless User Is Logged In check box on the EAP-FAST Settings screen, or use the Novell
Network login prompt or any other third-party login application that does not share its
credentials with the EAP-FAST supplicant.
Note If you try to import a PAC file with the same PAC ID as a previously imported PAC file,
you are asked if you want to overwrite the existing PAC. If you click Yes, the existing
PAC is replaced by the new one from the imported file.
f. If the Enter PAC File Password screen appears (see Figure 5-10), enter the PAC file password
and click OK.
Note PAC file passwords are optional. The PAC authority determines whether to issue PAC
files that require user-supplied passwords. Nevertheless, all PAC files (even those
without passwords) are encrypted and protected. PAC file passwords are different from
EAP-FAST passwords and need to be entered only once, at the time a PAC is imported.
g. The PAC file is imported and added to your PAC database, and the name of the PAC authority
that issued the PAC file is added to the PAC authority drop-down list on the EAP-FAST Settings
screen. Choose the desired PAC authority from the list.
Step 11 Click OK to exit the EAP-FAST Settings screen.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
OL-1394-08 5-47
Step 12 Check the Allow Fast Roaming (CCKM) check box on the Network Security screen if you want to
enable fast roaming for your client adapter.
• Checking this check box enables the client adapter to use CCKM when associated to an access point
that uses CCKM or to associate to access points that are not using CCKM.
• Unchecking this check box prevents the client adapter from using CCKM even with access points
that use it.
Default: Unchecked
Note Refer to the “Fast Roaming (CCKM)” section on page 5-28 for additional information.
Step 13 Check the Allow Association to both WPA and non-WPA authenticators check box if you want to
allow the client adapter to associate to access points that are configured for EAP-FAST authentication
with:
• WPA enabled (associates with WPA security)
• WPA disabled or not supported (associates without WPA security)
• Cisco migration mode, where WPA is optional (associates without WPA security)
If this check box is not checked, the client adapter can associate only to access points that are configured
for EAP-FAST authentication with WPA.
Default: Unchecked
Step 14 Click OK to exit the Network Security screen and return to the Profile Manager screen. On the Profile
Manager screen, click OK or Apply to save your changes.
Step 15 Follow these steps if the Microsoft 802.1X supplicant is installed on your computer and you want to take
advantage of the fast roaming feature:
a. Perform one of the following steps, depending on your computer’s operating system:
– If your computer is running Windows 2000, double-click My Computer, Control Panel, and
Network and Dial-up Connections. Right-click Local Area Connection. Click Properties.
The Local Area Connection Properties screen appears.
– If your computer is running Windows XP, double-click My Computer, Control Panel, and
Network Connections. Right-click Wireless Network Connection. Click Properties. The
Wireless Network Connection Properties screen appears. Choose the Wireless Networks tab.
Uncheck the Use Windows to configure my wireless network settings check box unless you
are using Windows XP Service Pack 1.
b. Click the Authentication tab.
Note In Windows Service Pack 1, the Authentication tab has moved from its previous location. To
access it, make sure the Use Windows to configure my wireless network settings check
box is checked. Click the SSID of the profile you are creating from the list of available
networks and click Configure. If your profile’s SSID is not listed, click Add, enter your
profile’s SSID in the Network name (SSID) field, and choose the Authentication tab.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
5-48 OL-1394-08
c. Uncheck the Enable network access control using IEEE 802.1X or Enable IEEE 802.1x
authentication for this network check box.
d. Click OK to save your settings.
e. If you are using Windows XP Service Pack 1, uncheck the Use Windows to configure my wireless
network settings check box on the Wireless Networks screen and click OK.
Step 16 If you imported a PAC file in Step 10, you may want to consider deleting it from its original location,
depending on your organization’s policy. PAC files are similar to ID cards and should be protected from
unauthorized access. Such action would prevent exposure of the PAC by having multiple storage
locations. Contact your system administrator to determine your organization’s policy on PAC security.
Step 17 Refer to Chapter 6 for instructions on authenticating using EAP-FAST.
Note Meetinghouse AEGIS Client supplicant version 2.1 or later is also supported for use with
Windows 2000 and XP; however, it was not tested with this client adapter software release.
You can download the Meetinghouse supplicant from the following URL:
http://www.mtghouse.com/support/downloads/index.shtml
• Access points to which your client adapter may attempt to authenticate must use the following
firmware versions or later: 12.00T (340, 350, and 1200 series access points) or Cisco IOS Release
12.2(4)JA (1100 series access points).
Note To use WPA or fast roaming, access points must use Cisco IOS Release 12.2(11)JA or later.
• All necessary infrastructure devices such as access points, servers, gateways, and user databases
must be properly configured for the authentication type you plan to enable on the client.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
OL-1394-08 5-49
This section consists of the following three subsections. Follow the steps in each subsection to enable
host-based EAP authentication (EAP-TLS, PEAP, or EAP-SIM) for this profile.
• Enabling Host-Based EAP authentication in ACU
• Enabling WPA (an optional procedure for computers running Windows 2000 or XP)
• Enabling EAP authentication in Windows
Note Because EAP-TLS, PEAP, and EAP-SIM authentication are enabled in the operating system and not in
ACU, you cannot switch between these authentication types simply by switching profiles in ACU. You
can create a profile in ACU that uses host-based EAP, but you must enable the specific authentication
type in Windows (provided Windows uses the Microsoft 802.1X supplicant). In addition, Windows can
be set for only one authentication type at a time; therefore, if you have more than one profile in ACU
that uses host-based EAP and you want to use another authentication type, you must change
authentication types in Windows after switching profiles in ACU.
Step 1 Check the Wi-Fi Protected Access (WPA) check box under Network Authentication on the Network
Security screen if you want to enable WPA. This parameter enables the client adapter to associate to
access points using WPA.
Note Refer to the “Wi-Fi Protected Access (WPA)” section on page 5-27 for additional information.
Step 2 Choose Host Based EAP (802.1x) or Host Based EAP (WPA).
Note If WPA is disabled, 802.1x appears in parentheses. If WPA is enabled, WPA appears in
parentheses.
Step 3 Choose Dynamic WEP under Data Encryption if WPA is not enabled.
Step 4 Click OK to return to the Profile Manager screen.
Step 5 Click OK or Apply on the Profile Manager screen to save your changes.
Step 6 Perform one of the following, depending on your computer’s operating system:
• If your computer is running Windows 98, 98 SE, NT, or Me, run the Microsoft 802.1X
Authentication Client application. Then go to Step 2 of the “Enabling EAP Authentication in
Windows” section on page 5-54.
• If your computer is running Windows 2000, perform one of the following:
– If you want to enable WPA, go to the “Enabling WPA (Windows 2000 or XP Only - Optional)”
section below.
– If you do not want to enable WPA, double-click My Computer, Control Panel, and Network
and Dial-up Connections. Right-click Local Area Connection. Click Properties. The Local
Area Connection Properties screen appears. Go to the “Enabling EAP Authentication in
Windows” section on page 5-54.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
5-50 OL-1394-08
Windows 2000
Follow these steps to enable WPA in Funk Odyssey Client supplicant version 2.2 on a computer running
Windows 2000.
Windows XP
Follow these steps to enable WPA in Windows XP Service Pack 1 and Microsoft support patch 815485.
Step 1 Choose the Wireless Networks tab on the Wireless Network Connection Properties screen. The
following screen appears (see Figure 5-11).
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
OL-1394-08 5-51
Figure 5-11 Wireless Network Connection Properties Screen (Wireless Networks Tab)
Step 2 Make sure that the Use Windows to configure my wireless network settings check box is checked.
Step 3 Click the SSID of the profile you began setting up in ACU from the list of available networks and click
Configure. If your profile’s SSID is not listed, click Add. The Wireless Network Properties screen
appears (see Figure 5-12).
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
5-52 OL-1394-08
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
OL-1394-08 5-53
Step 1 Click the Authentication tab. The following screen appears (see Figure 5-13).
Note The Authentication screen shown above appears on computers running Windows 2000 or XP.
The screen looks slightly different on computers running Windows 98, 98 SE, NT, or Me or
Windows XP Service Pack 1.
Step 2 Check the Enable network access control using IEEE 802.1X or Enable IEEE 802.1x authentication
for this network check box if you did not enable WPA.
Step 3 Perform one of the following, depending on the authentication type you want to use:
• If you are planning to use EAP-TLS, go to the “Enabling EAP-TLS” section on page 5-55.
• If you are planning to use PEAP, go to the “Enabling PEAP” section on page 5-58.
• If you are planning to use EAP-SIM, go to the “Enabling EAP-SIM” section on page 5-60.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
5-54 OL-1394-08
Enabling EAP-TLS
Step 1 For EAP type, choose Certificates (on Windows 98, 98 SE, NT, or Me) or Smart Card or other
Certificate (on Windows 2000 or XP).
Step 2 Click Properties. The Certificate Properties screen (see Figure 5-14) or the Smart Card or other
Certificate Properties screen appears (see Figure 5-15 and Figure 5-16).
Figure 5-14 Certificate Properties Screen - Windows 98, 98 SE, NT, and Me
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
OL-1394-08 5-55
Figure 5-15 Smart Card or other Certificate Properties Screen - Windows 2000 and XP
Figure 5-16 Smart Card or Other Certificate Properties Screen - Windows XP Service Pack 1
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
5-56 OL-1394-08
Note If you enter a server name and the client adapter connects to a server that does not match the
name you entered, you are prompted to accept or cancel the connection during the authentication
process.
Note If you leave this field blank, the server name is not verified, and a connection is established as
long as the certificate is valid.
Note If you leave this field blank or all check boxes unchecked, you are prompted to accept a
connection to the root certification authority during the authentication process.
Step 8 Click OK two or three times to save your settings. The configuration is complete.
Step 9 Refer to Chapter 6 for instructions on authenticating using EAP-TLS.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
OL-1394-08 5-57
Enabling PEAP
Step 3 Check the Validate server certificate check box if server certificate validation is required
(recommended).
Step 4 If you want to specify the name of the server to connect to, check the Connect only if server name ends
with check box and enter the appropriate server name suffix in the field below.
Note If you enter a server name and the client adapter connects to a server that does not match the
name you entered, you are prompted to accept or cancel the connection during the authentication
process.
Note If you leave this field blank, the server name is not verified, and a connection is established as
long as the certificate is valid.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
5-58 OL-1394-08
Step 5 Make sure that the name of the certificate authority from which the server certificate was downloaded
appears in the Trusted root certificate authority (CA) field. If necessary, click the arrow on the
drop-down menu and choose the appropriate name.
Note If you leave this field blank, you are prompted to accept a connection to the root certification
authority during the authentication process.
Step 6 Check the Connect only if server is signed by specified trusted root CA check box if you want to
ensure that the certificate server uses the trusted root certificate specified in the field above. This
prevents the client from establishing connections to rogue access points.
Step 7 Perform one of the following:
• Check the Always try to resume secure session check box if you want the PEAP protocol to always
attempt to resume the previous session before prompting you to re-enter your credentials.
• Uncheck the Always try to resume secure session check box if you want to be prompted to re-enter
your username and password whenever your client adapter’s radio becomes disassociated (for
example, when the card is ejected, the radio is turned off, you wander out of range of an access point,
you switch profiles, and so on).
Note Checking this check box gives you the convenience of not having to re-enter your username and
password when your client adapter experiences momentary losses of association. The PEAP
Session Timeout setting on the Cisco Secure ACS System Configuration - Global Authentication
Setup screen controls how long the resume feature is active (that is, the amount of time during
which the PEAP session can be resumed without re-entering user credentials). If you leave your
device unattended during this timeout period, be aware that someone can resume your PEAP
session and access the network.
Step 8 Currently Generic Token Card is the only second phase EAP type available. Click Properties. The
Generic Token Card Properties screen appears (see Figure 5-18).
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
OL-1394-08 5-59
Step 9 Choose either the Static Password (Windows NT/2000, LDAP) or the One Time Password option,
depending on your user database.
Step 10 Perform one of the following:
• If you selected the Static Password (Windows NT/2000, LDAP) option in Step 9, go to Step 11.
• If you selected the One Time Password option in Step 9, check one or both of the following check
boxes to specify the type of tokens that will be supported for one-time passwords:
– Support Hardware Token—A hardware token device obtains the one-time password. You
must use your hardware token device to obtain the one-time password and enter the password
when prompted for your user credentials.
– Support Software Token—The PEAP supplicant works with a software token program to
retrieve the one-time password. You have to enter only the PIN, not the one-time password. If
you check this check box, you must also select from the Supported Type drop-down box the
software token software that is installed on the client (such as Secure Computing SofToken
Version 1.3, Secure Computing SofToken II 2.0, or RSA SecurID Software Token v 2.5), and if
Secure Computing SofToken Version 1.3 is selected, you must locate the software program path
using the Browse button.
Note The SofToken Program Path field is unavailable if a software token program other than
Secure Computing SofToken Version 1.3 is selected.
Step 11 Click OK three times to save your settings. The configuration is complete.
Step 12 Refer to Chapter 6 for instructions on authenticating using PEAP.
Enabling EAP-SIM
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
5-60 OL-1394-08
Step 3 To access any resources (data or commands) on the SIM, the EAP-SIM supplicant must provide a valid
PIN to the SIM card, which must match the PIN stored on the SIM. Choose one of the following options
to specify how the EAP-SIM supplicant should handle the SIM card’s PIN:
• Ask for my PIN once after I turn my computer on (recommended)—The software does not
permanently store the PIN. It prompts you for the PIN once, on the first authentication of every
session, where a session is defined as the time between power-up and shutdown or reboot.
• Ask for my PIN every time the network asks for authentication—The software never stores the
PIN; it prompts you for the PIN every time an EAP-SIM authentication is performed. This option is
not recommended if your client will be roaming between access points or if session timeouts are
implemented (such as for accounting and security purposes).
• Let me give my PIN to the computer now and never ask me again; PIN will be encrypted and
stored on computer (not recommended)—You need to enter the PIN only once, in the Enter PIN
edit box below this option. The software stores the PIN in the registry and retrieves it from there
when required. If you choose this option, you must enter the PIN now. The PIN is validated when
an authentication attempt is made.
Note This option is not recommended because it enables others to use the SIM without knowing
the PIN.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
OL-1394-08 5-61
Step 1 Choose None under Network Authentication on the Network Security screen in ACU and click OK.
Step 2 Click OK or Apply on the Profile Manager screen.
Step 3 Perform one of the following, depending on your computer’s operating system:
• If your computer is running Windows 98, 98 SE, NT, or Me, run the Microsoft 802.1X
Authentication Client application. Then go to Step 5.
• If your computer is running Windows 2000, double-click My Computer, Control Panel, and
Network and Dial-up Connections. Right-click Local Area Connection. Click Properties. The
Local Area Connection Properties screen appears.
• If your computer is running Windows XP, double-click My Computer, Control Panel, and
Network Connections. Right-click Wireless Network Connection. Click Properties. The
Wireless Network Connection Properties screen appears. If you are using Windows XP Service Pack
1, click the Wireless Networks tab, click the SSID of the profile for which you are disabling
host-based EAP in the Preferred networks list, and click Properties.
Step 4 Click the Authentication tab.
Step 5 Uncheck the Enable network access control using IEEE 802.1X or Enable IEEE 802.1x
authentication for this network check box.
Step 6 Click OK.
Cisco Aironet 340, 350, and CB20A Wireless LAN Client Adapters Installation and Configuration Guide for Windows
5-62 OL-1394-08