Settings
153
2. Touch Wi-Fi.
3. Slide the Wi-Fi switch to the On position.
4. Scroll to the bottom of the list and select Add network.
5. In the Network SSID text box, enter the name of the Wi-Fi network.
6. In the Security drop-down list, select the type of security. Options:
• None
• WEP
• WPA/WPA2 PSK
• 802.1x EAP.
7. If the network security is None, touch Save.
8. If the network security is WEP or WPA/WPA2 PSK, enter the required password and then touch Save.
9. If the network security is 802.1x EAP:
• Touch the EAP method drop-down list and select PEAP, TLS, TTLS or LEAP.
• Touch the Phase 2 authentication drop-down list and select an authentication method.
• If required, touch CA certificate and select a Certification Authority (CA) certificate. Note: Certificates are
installed using the Security settings.
• If required, touch User certificate and select a user certificate. Note: User certificates are installed using
the Security settings.
• If required, in the Identity text box, enter the username credentials.
• If desired, in the Anonymous identity text box, enter an anonymous identity username.
• If required, in the Password text box, enter the password for then given identity.
10. Touch Save. To connect to the saved network, touch and hold on the saved network and select Connect to
network.
11. Touch .
Configuring for a Proxy Server
A proxy server is a server that acts as an intermediary for requests from clients seeking resources from other
servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or
other resource, available from a different server. The proxy server evaluates the request according to its filtering
rules. For example, it may filter traffic by IP address or protocol. If the request is validated by the filter, the proxy
provides the resource by connecting to the relevant server and requesting the service on behalf of the client.
It is important for enterprise customers to be able to set up secure computing environments within their companies,
and proxy configuration is an essential part of doing that. Proxy configuration acts as a security barrier ensuring
that the proxy server monitors all traffic between the Internet and the intranet. This is normally an integral part of
security enforcement in corporate firewalls within intranets.
1. In the network dialog box, touch a network.
2. Touch Advanced options.
3. Touch Proxy and select Manual.
NOTE: By default, the network Proxy is set to None and the IP settings is set to DHCP. See Configuring for a
Proxy Server on page 153 for setting connection to a proxy server and see Configuring the Device to Use a Static
IP Address on page 154 for setting the device to use a static IP address.