Registering Certificates
-
Register a client certificate.
When EAP-TLS is selected for the authentication method, it is necessary to upload (register) key and client certificates issued by a certificate authority with Remote UI.
-
Remote UI
Security > IEEE802.1X/EAP settings > Key and certificate settings > Upload key and certificate
-
-
Register a CA certificate.
It is necessary to enable [Verify authentication server certificates] and register a CA certificate. Upload (register) the certificate with Remote UI.
-
Remote UI
Security > IEEE802.1X/EAP settings > CA certificate > Upload CA certificate
Any authentication method also allows you to make settings not to verify a server certificate. In this instance, it is not necessary to upload a CA certificate.
If the security policy imposes a restriction, you must verify the server certificate.
-
Remote UI
Security > IEEE802.1X/EAP settings > Authentication > deselect Verify authentication server certificates
-
Select Enable/disable IEEE802.1X/EAP to enable IEEE802.1X/EAP.
Select OK and save the settings to enable IEEE802.1X/EAP.
Note
-
You can enable or disable IEEE802.1X/EAP on the operation panel.
Note that the advanced IEEE802.1X/EAP settings are not available on the operation panel.
-
-
Connect to IEEE802.1X/EAP switch (Authenticator) or IEEE802.1X/EAP access point.
When IEEE802.1X/EAP is enabled, it is possible to search for SSIDs of IEEE802.1X/EAP access points in the Wi-Fi detailed settings screen on the operation panel.
Select the SSID of the IEEE802.1X/EAP access point to connect.
For a Wired LAN, connect the LAN cable to the IEEE802.1X/EAP switch.
-
If You Cannot Connect
If you are unable to connect to the IEEE802.1X/EAP switch (Authenticator) or access point, please redo the settings.
Important
-
Connecting to an IEEE802.1X/EAP access point automatically disables the Wireless Direct setting.To use Wireless Direct, first re-enable it in the operation panel settings.
Note
-
If you cannot access to Remote UI after you restart LAN, reload your web browser.
Specifications of keys and certificates that can be used for encrypted communication.