Home > Honeywell > Personal Computer > Honeywell Vx9 Manual

Honeywell Vx9 Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Honeywell Vx9 Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 178 Honeywell manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							6 - 27
    To use Sign-On credentials:
     Do not enter a User and Password as the user will be prompted for the Username and Password when connecting 
    to the network.
    To use Stored Credentials:
     Enter the Domain\Username (if the Domain is required), otherwise enter the Username. 
     Enter the password.
    To use Automatic PAC Provisioning:
     No additional entries are required.
    To use manual PAC Provisioning:
     Enter the PAC Filename and PAC Password.
     The PAC file must be copied to the directory specified in the Certs Path global variable. The PAC file must not be 
    read only.
    Ensure the correct Active Profile is selected on the Configuration tab and restart. The Status tab shows the device is 
    connected.
    Note: When using Automatic PAC Provisioning, once authenticated, there is a file stored in the C:\Program 
    Files\Laird\certs directory with the PAC credentials. If the username is changed, that file must be deleted. The 
    filename is autoP.00.pac. 
    						
    							6 - 28
    EAP-TLS
    To use EAP-TLS, make sure the following profile options are used.
    1. Enter the SSID of the Access Point assigned to this profile
    2. Set Auth Type to Open
    3. Set WPA as follows:
    WPA/WPA2 to use either TKIP/AES or AES-CCMP
    WPA2 to use AEX-CCMP
    4. Set Encryption to either TKIP/AES or AES-CCMP depending on WPA type selected
    5. Set Authentication to EAP-TLS
    See Sign-On vs. Stored Credentials (page 6-13) for information on entering credentials.
    Scroll down to enter credentials.
     No entries except the User Certificate Filename and the CA Certificate Filename are necessary for Sign-On 
    Credentials as the user will be prompted for the User Name when connecting to the network. 
     For Stored Credentials, User Certificate Filename and the CA Certificate Filename must be entered.
    Enter these items as directed below.
    Enter the Domain\Username (if the Domain is required), otherwise enter the Username. 
    						
    							6 - 29
    Select a user certificate from the Windows certificate store. Use the Browse button to locate the User Cert from the 
    certificate store. Highlight the desired certificate and press the Select button. The name of the certificate is displayed 
    in the User Cert box.
    Some versions of the LCM require a User Cert password. If this entry field is present, enter the password for the user 
    certificate in the User Cert pwd box.
    If there are no user certificates in the Windows certificate store, follow these instructions for Generate a User 
    Certificate (page 6-68) and Install a Root CA Certificate (page 6-66).
    See Windows Certificate Store vs. Certs Path (page 6-15) for more information on CA certificate storage.
    Check the Validate server checkbox. 
    If using the Windows certificate store:
    1. Check the Use MS store checkbox. The default is to use the Full Trusted Store. 
    2. To select an individual certificate, click on the Browse button.
    3. Uncheck the Use full trusted store checkbox.
    4. Select the desired certificate and click Select. You are returned to the Credentials screen.
    5. Click Commit.
    If using the Certs Path option:
    1. Leave the Use MS store box unchecked.
    2. Enter the certificate filename in the CA Cert text box.
    3. Click Commit.
    The Thor VX9 should be authenticating the server certificate and using EAP-TLS for the user authentication. 
    Ensure the correct Active Profile is selected on the Configuration tab and restart. The Status tab shows the device is 
    connected.
    See Certificates (page 6-64) for information on generating a Root CA certificate or a User certificate.
    Note: The date must be properly set on the device to authenticate a certificate. 
    						
    							6 - 30
    EAP-TTLS
    To use EAP-TTLS, make sure the following profile options are used.
    1. Enter the SSID of the Access Point assigned to this profile
    2. Set Auth Type to Open
    3. Set WPA as follows:
    WPA/WPA2 to use either TKIP/AES or AES-CCMP
    WPA2 to use AEX-CCMP
    4. Set Encryption to either TKIP/AES or AES-CCMP depending on WPA type selected
    5. Set Authentication to EAP-TTLS
    See Sign-On vs. Stored Credentials (page 6-13) for information on entering credentials.
    Scroll down to enter credentials:.
     No entries except the CA Certificate Filename are necessary for Sign-On Credentials as the user will be prompted 
    for the User Name and Password when connecting to the network.
     For Stored Credentials, User, Password and the CA Certificate Filename must be entered.
    Enter these items as directed below.
    Enter the Domain\Username (if the Domain is required), otherwise enter the Username. 
    						
    							6 - 31
    Enter the password.
    Leave the CA Certificate File Name blank for now.
    Click OK then click Commit. Ensure the correct Active profile is selected on the Configuration tab.
    See Windows Certificate Store vs. Certs Path (page 6-15) for more information on certificate storage.
    Once successfully authenticated, import the CA certificate into the Windows certificate store. Return to the Credentials 
    screen and check the Validate server checkbox. 
    If using the Windows certificate store:
    1. Check the Use MS store checkbox. The default is to use the Full Trusted Store. 
    2. To select an individual certificate, click on the Browse button.
    3. Uncheck the Use full trusted store checkbox.
    4. Select the desired certificate and click Select. You are returned to the Credentials screen.
    5. Click OK then click Commit.
    If using the Certs Path option:
    1. Leave the Use MS store box unchecked.
    2. Enter the certificate filename in the CA Cert text box.
    3. Click OK then click Commit.
    The device should be authenticating the server certificate and using PEAP/MSCHAP for the user authentication. 
    Ensure the correct Active Profile is selected on the Configuration tab and restart. The Status tab shows the device is 
    connected.
    Note: The date must be properly set on the device to authenticate a certificate. 
    						
    							6 - 32
    PEAP-TLS
    To use PEAP-TLS, make sure the following profile options are used.
    1. Enter the SSID of the Access Point assigned to this profile
    2. Set Auth Type to Open
    3. Set WPA as follows:
    WPA/WPA2 to use either TKIP/AES or AES-CCMP
    WPA2 to use AEX-CCMP
    4. Set Encryption to either TKIP/AES or AES-CCMP depending on WPA type selected
    5. Set Authentication to PEAP-TLS
    See Sign-On vs. Stored Credentials (page 6-13) for information on entering credentials.
    Scroll down to enter credentials.
     No entries except the User Certificate Filename and the CA Certificate Filename are necessary for Sign-On 
    Credentials as the user will be prompted for the User Name when connecting to the network. 
     For Stored Credentials, User Certificate Filename and the CA Certificate Filename must be entered.
    Enter these items as directed below.
    Enter the Domain\Username (if the Domain is required), otherwise enter the Username. 
    						
    							6 - 33
    Select a user certificate from the Windows certificate store. Use the Browse button to locate the User Cert from the 
    certificate store. Highlight the desired certificate and press the Select button. The name of the certificate is displayed 
    in the User Cert box.
    Some versions of the LCM require a User Cert password. If this entry field is present, enter the password for the user 
    certificate in the User Cert pwd box.
    If there are no user certificates in the Windows certificate store, follow these instructions for Generate a User 
    Certificate (page 6-68) and Install a User Certificate (page 6-70).
    See Windows Certificate Store vs. Certs Path (page 6-15) for more information on CA certificate storage.
    Check the Validate server checkbox. 
    If using the Windows certificate store:
    1. Check the Use MS store checkbox. The default is to use the Full Trusted Store. 
    2. To select an individual certificate, click on the Browse button.
    3. Uncheck the Use full trusted store checkbox.
    4. Select the desired certificate and click Select. You are returned to the Credentials screen.
    5. Click Commit.
    If using the Certs Path option:
    1. Leave the Use MS store box unchecked.
    2. Enter the certificate filename in the CA Cert text box.
    3. Click Commit.
    The Thor VX9 should be authenticating the server certificate and using EAP-TLS for the user authentication. 
    Ensure the correct Active Profile is selected on the Configuration tab and restart. The Status tab shows the device is 
    connected.
    See Certificates (page 6-64) for information on generating a Root CA certificate or a User certificate.
    Note: The date must be properly set on the device to authenticate a certificate. 
    						
    							6 - 34
    WPA PSK
    To connect using WPA/PSK, make sure the following profile options are used:
    1. Enter the SSID of the Access Point assigned to this profile
    2. Set Auth Type to Open
    3. Set WPA as follows:
    WPA/WPA2 to use either TKIP/AES or AES-CCMP
    WPA2 to use AEX-CCMP
    4. Set Encryption to either TKIP/AES or AES-CCMP depending on WPA type selected
    5. Set Authentication to PSK
    Click the WEP keys/PSKs button.
    This value can be 64 hex characters or an 8 to 63 byte ASCII value. Enter the key and click OK.
    Once configured, click the Commit button.
    Ensure the correct Active Profile is selected on the Configuration tab and restart. The Status tab shows the device is 
    connected. 
    						
    							6 - 35
    Summit Wireless Network Configuration
    The Summit client device is a Summit 802.11a/b/g/n radio, capable of 802.11a, 802.11b, 802.11g and 802.11n data rates. The 
    radio can be configured for no encryption, WEP encryption or WPA security.
    Security Options Supported are:
    No Security (page 6-51)
    WEP (page 6-52)
    LEAP (page 6-53)
    PEAP/MSCHAP (page 6-54)
    PEAP/GTC (page 6-56)
    WPA/LEAP (page 6-58)
    EAP-FAST (page 6-59)
    EAP-TLS (page 6-61)
    WPA PSK (page 6-63)
    Important Notes
    After making any changes to the wireless configuration, restart the Thor VX9.
    Summit Client Utility
    Note: When making changes to profile or global parameters, the device should be restarted afterwards.
    Start > Programs > Summit > SCU or 
    SCU Icon on Desktop or 
    Summit Tray Icon (if present) or 
    Wi-FI Icon in the Windows Control Panel (if present)
    The Main (page 6-37) tab provides information, admin login and active profile selection.
    Profile specific parameters are found on the Profile (page 6-39) tab. The parameters on this tab can be set to unique values 
    for each profile. This tab was labeled Config in early versions of the SCU.
    The Status (page 6-41) tab contains information on the current connection.
    The Diags (page 6-42) tab provides utilities to troubleshoot the radio.
    Global parameters are found on the Global (page 6-43) tab. The values for these parameters apply to all profiles. This tab 
    was labeled Global Settings in early versions of the SCU.
    Help
    Help is available by clicking the ? icon in the title bar on most SCU screens.
    The SCU help may also be accessed by selecting Start > Help and tapping the Summit Client Utility link. The SCU 
    does not have to be accessed to view the help information using this option. It is important that all dates are correct on the Thor VX9 and host computers when using any type of certificate. 
    Certificates are date sensitive and if the date is not correct authentication will fail.
    Verify and adjust the date using the Date and Time control panel.
    It may be necessary to upgrade radio software in order to use certain Summit Client Utility (SCU) features.  Contact 
    Technical Assistance (page 9-1) for details.
    When using the 802.11a radio, the U-NII 1 band is the preferred band for indoor operation. For regulatory domains 
    in which the U-NII 3 band is allowed, the following channels are supported: 149, 153, 157 and 161. The AP must 
    be configured accordingly.
    !
    ! 
    						
    							6 - 36
    Summit Tray Icon
    The Summit tray icon is displayed when:
     The Summit radio is installed and active
     The Windows Zero Config utility is not active
     The Tray Icon setting is On
     Tray icon is not shown when the Thor VX9 is running Windows 7 or Windows Embedded Standard.
    Click the icon to launch the SCU.
    Use the tray icon to view the radio status:Windows XP and XP embedded:
    The Summit tray icon provides access to the SCU and is a visual indicator of radio status. ()
    Windows 7 Professional:
    The Windows Wireless icon (located in the taskbar or Notification bar) may not display a successful wireless connec-
    tion. The SCU Main tab should be used to verify the success of the connection instead.
    The radio is not currently associated or authenticated to an Access Point
    The signal strength for the currently associated/authenticated Access Point is less than -90 dBm
    The signal strength for the currently associated/authenticated Access Point is -71 dBm to -90 dBm
    The signal strength for the currently associated/authenticated Access Point is -51 dBm to -70 dBm
    The signal strength for the currently associated/authenticated Access Point is greater than -50 dBm 
    						
    All Honeywell manuals Comments (0)