Chapter 2 — Configuring Network Settings
IF61 Fixed Reader User’s Manual 49
4 Click Activate Changes to save your settings and
immediately make them active.
Managing Certificates
The default server certificate on the IF61 (ValidForHTTPSOnly)
supports the secure web browser interface. You can use a
third-party CA to issue unique client certificates and a root
certificate.
Parameters for WPA2 Enterprise Security
Parameter Description
Allowed EAP
Authentication
Method
Specifies which 802.1x authentication
protocol (TLS, TTLS, PEAP, or LEAP) the
IF61 sends to the authentication server if the
server sends an unauthorized protocol.
Username User name for TTLS, PEAP, or LEAP
authentication.
Password Password for TTLS, PEAP, or LEAP
authentication.
Validate CA Certificate Enables or disables verification of the server
certificate signature against the certificate
installed on the IF61.
CA Certificate
Common Name
Common name for the server certificate.
Reject Expired
Certificates
Check this check box to reject expired
certificates.
Minimum WPA2
Multicast Encryption
Choose a data encryption method for
non-unicast transmission/reception:
CCMP (RSN): (Default) Use Counter
Mode - CBC MAC Protocol for
multicast/group keying.
TKIP (RSN): Choose Temporal Key Integrity
Protocol for multicast/group keying.
Pairwise Encryption
(Unicast)
Choose a data encryption method for unicast
transmission/reception:
CCMP: (Default) Use Counter Mode -
CBC MAC Protocol for multicast/group
keying.
TKIP: Use Temporal Key Integrity Protocol
for multicast/group keying.