Set Administrator Password
Administrator Tool Settings
Administrator Packages for Windows XP*
Administrator Profiles
Application Settings
Adapter Settings (Administrator)
EAP-FAST A-ID Groups
Administrator Tasks
NOTE: Throughout this Help, the terms "wireless" and "WiFi" are used interchangeably.
The Administrator Tool is used by the person who has administrator privileges on this computer. This tool is used to configure Pre-logon/Common profiles, and Persistent Connection profiles. The Administrator Tool can be used by an Information Technology department to configure user settings and to create custom install packages to export to other systems.
The Administrator Tool is located on the Tools menu. The Administrator Tool must be selected during a Custom installation of the Intel(R) PROSet/Wireless WiFi Connection Utility or the feature is not displayed.
An Administrator Package is a self-extracting executable file that generally contains the WiFi connection utility, administrative profiles, and other settings. You can copy or send an administrative package to clients on your network. When the executable runs, the contents are installed and configured on the destination computer. If a profile is part of the package, the profile governs how the destination computer connects to a specific WiFi network.
NOTE: To create and export a package for a computer running on Microsoft Windows Vista*, you need to create the package on a computer running Windows Vista. You cannot create a package for Windows Vista on a computer running Microsoft Windows XP*.
Name Description Create a Windows XP package Create a package that can be exported to a user's computer running Microsoft Windows XP* operating system. This package allows export of all 802.1X authentication EAP-type Pre-logon/Common and Persistent profiles.
Create a Windows Vista package Not Available. To create and export a package for a computer running on Microsoft Windows Vista*, you need to create the package on a computer running Windows Vista. You cannot create a package for Windows Vista on a computer running Microsoft Windows XP*.
Open an existing package
Select to browse for and open an existing package.
Name Description Profiles Click Include Profiles in this package. Profiles can be shared with other users.
Application Settings Click Include Application Settings in this package. Specify application settings to be enabled.
Click Include Adapter Settings in this package. Specify initial values for adapter settings used on this computer.
Click Include A-ID Groups. Add A-ID Group to support multiple PACs from multiple A-IDs.
NOTE: You can also select Save Package on the File menu to save the package.
NOTE: You can also select Open Package on the File menu to edit an Administrator Package.
Administrator Profiles are managed by the network administrator. These profiles can be exported to other computers.
These profiles are common or shared by all users on this computer. However, end users cannot modify these profiles. They can only be modified from the Administrator Tool, which is password protected.
However you can create Voice over IP (VoIP) profiles for export to a soft-phone application, and you can add pre-existing Common profiles and existing VoIP profiles, or VoIP profiles that you create to a package. There are two types of Administrator Profiles: Persistent and Pre-logon/Common.
Persistent profiles are applied at boot time or whenever no one is logged on the computer. After a user logs off, a Persistent profile maintains a wireless connection either until the computer is turned off or a different user logs on.
Persistent profile key points:
NOTE: The WiFi connection utility supports machine certificates. However, they are not displayed in the certificate listings.
To create a Persistent profile:
Pre-logon/Common profiles are applied prior to a user log on. If Single Sign On support is installed, the connection is made prior to the Windows log-on sequence (Pre-logon/Common).
If Single Sign On support is not installed, the profile is applied once the user session is active. Pre-logon/Common profiles always appear at the top of the Profiles list. Users can still prioritize profiles that they have created but they cannot reprioritize Pre-logon/Common profiles. Because these profiles appear at the top of the Profiles list, the WiFi connection utility automatically attempts to connect to the Administrator profiles first before any user-created profiles.
NOTE: Only administrators can create or export Pre-logon/Common profiles.
Pre-logon Connect key points are:
Pre-logon/Common profiles support is installed during a Custom install of the WiFi connection utility. See Install or Uninstall the Single Sign On Feature for more information.
NOTE: If the Single Sign On or Pre-logon Connect features are not installed, an administrator is still able to create Pre-logon/Common profiles for export to a user's computer.
The following describes how the Pre-logon Connect feature functions from system power-up. The assumption is that a saved profile exists. This saved profile has valid security settings marked with "Use Windows Logon user name and password" that are applied at the time of Windows log on.
NOTE: A user certificate can only be accessed by a user that has been authenticated on the computer. Therefore, a user should log onto the computer once (using either a wired connection, alternate profile or local log in) before using a Pre-logon/Common profile that authenticates with a user certificate.
When you log off, any wireless connection is disconnected and a persistent profile (if one is available) is applied. Under certain circumstances, it is desirable to maintain the current connection (for example, if user-specific data needs to be uploaded to the server post-log off or when roaming profiles are used).
Create a profile that is marked as both Pre-logon/Common and persistent to achieve this functionality. If such a profile is active when the user logs off, the connection is maintained.
To create a Pre-logon/Common Profile:
NOTE: If a Persistent connection was already established, a Pre-logon/Common profile is ignored unless the profile is configured with both Pre-logon/Common and Persistent connection options.
Administrators can designate WiFi networks to be excluded from connection. Once a network is excluded, only an administrator can remove the network from the Exclude list. The excluded network is displayed in the Exclude List Management and is indicated by this icon:
To exclude a WiFi network:
To remove a WiFi network from exclusion:
The WiFi connection utility supports VoIP third-party soft-phone applications. Third-party VoIP applications support voice codecs. Codecs generally provide a compression capability to save network bandwidth. The WiFi connection utility supports the following International Telecommunications Union (ITU) codec standards:
Codec
Algorithm
ITU G.711
PCM (Pulse Code Modulation)
ITU G.722
SBADPCM (Sub-Band Adaptive Differential Pulse Code Modulation)
ITU G.723
Multi-rate Coder
ITU G.726
ADPCM (Adaptive Differential Pulse Code Modulation)
ITU G.727
Variable-Rate ADPCM
ITU G.728
LD-CELP (Low-Delay Code Excited Linear Prediction)
ITU G.729
CS-ACELP (Conjugate Structure Algebraic-Code Excited Linear Prediction)
An administrator can export VoIP settings to configure various codec data rates and frame rates to improve voice quality in VoIP transmissions.
To configure VoIP settings:
NOTE: Ensure Voice over IP is not disabled in the Administrator Tool Application Settings. It is enabled by default.
G711 has 10ms frame rate with 64kbps bit rate
G722 has 10ms frame rate with 64kbps bit rate
G723 has 30ms frame rate with either 5.3kbps or 6.4kbps bit rate
G726-32 has 10ms frame rate with 32kbps bit rate
G728 has 2.5ms frame rate with 16kbps bit rate
G729 has 10ms frame rate with 10kbps bit rateSelect parameters from the drop down menus.
Codec Usage Frame Rate
- G711_64kbps
- G722_64kbps
- G722_56kbps
- G722_48kbps
- G722_1_32kbps
- G722_1_24kbps
- G722_1_16kbps
- G726_16kbps
- G726_24kbps
- G726_32kbps
- G726_40kbps
- G728_16kbps
- G729a_8kbps
- G729e_11_8kbps
- GIPS_iPCM_VARIABLE
- G722_2_VARIABLE
- Interactive Voice
- Audio Conference
- Voice Data
- Video
- Streaming Audio
- 20
- 30
NOTE: This feature is unavailable if CCXv4 is not selected in the Administrator Tool Application Settings
An Authority Identifier (A-ID) is the RADIUS server that provisions Protected Access Credential (PACs) A-ID groups. A-ID groups are shared by all users of the computer and allow EAP-FAST profiles to support multiple PACs from multiple A-IDs.
The A-ID groups can be pre-configured by the administrator and set up through an Administrator Package on a user's computer. When a WiFi network profile encounters a server with an A-ID within the same group of the A-ID specified in the wireless network profile, it uses this PAC without a prompt to the user.
To add an A-ID Group:
If the A-ID group is locked, then additional A-IDs cannot be added to the group.
To add an A-ID to an A-ID group:
Once an A-ID group has been selected, the A-IDs are extracted from the PACs on the A-ID group server. The list of A-IDs is automatically populated.
If you do not have any certificates for EAP-TLS (TLS) or EAP-TTLS (TTLS) you must obtain a client certificate to allow authentication.
Certificates are managed from either Internet Explorer or the Microsoft Windows Control Panel.
Windows XP: When a client certificate is obtained, do not enable strong private key protection. If you enable strong private key protection for a certificate, you need to enter an access password for the certificate every time this certificate is used. You must disable strong private key protection for the certificate if you configure the service for TLS or TTLS authentication. Otherwise, the 802.1X service fails authentication because there is no logged in user to provide the required password.
Notes about Smart Cards
After a Smart Card is installed, the certificate is automatically installed on your computer and is chosen from the personal certificate store and root certificate store.
Step 1: Obtain a certificate
To allow TLS authentication, you need a valid client certificate in the local repository for the logged-in user's account. You also need a trusted CA certificate in the root store.
The following information provides two methods for obtaining a certificate:
If you do not know how to obtain a user certificate from the CA, consult your administrator for the procedure.
To install the CA on the local machine:
Use Microsoft Management Console (MMC) to verify that the CA is installed in the machine store.
NOTE: If this is the first certificate you have obtained, the CA first asks you if it should install a trusted CA certificate in the root store. This is not a trusted CA certificate. The name on the certificate is that of the host of the CA. Click Yes. You need this certificate for both TLS and TTLS.
To configure a profile with WPA authentication with WEP or TKIP encryption that uses TLS authentication:
NOTE: Obtain and install a client certificate, See Step 1 or consult your administrator.
Specify the certificate used by the WiFi connection utility.
Name Description Static Password On connection, enter the user credentials. One-time password (OTP) Obtain the password from a hardware token device. PIN (Soft Token) Obtain the password from a soft token program.