Configuration examples

The following examples are provided to show the primary adapter configured for IEEE 802.1X using several different authentication methods. Note that the certificate drop-downs are populated with certificates that you installed through the Certificate Management Platform Service.

Primary adapter configured to use IEEE 802.1X with EAP-TLS

Image

The certificate drop-downs are populated with certificates you installed through the Certificate Management Platform Service.

Primary adapter configured to use IEEE 802.1X with Tunneled TLS and TLS as the inner authentication method

Figure 2.   Adapter configured to use Tunneled TLS and TLS method
Image

Primary adapter configured to use IEEE 802.1X with Tunneled TLS and EAP–MSCHAPv2 as the inner authentication method

Figure 3.   Adapter configured to use Tunneled TLS and EAP–MSCHAPv2 method
Image

Primary adapter configured to use IEEE 802.1X with PEAP and MSCHAPv2 as the inner authentication method

Figure 4.   Adapter configured to use PEAP and MSCHAPv2 method
Image