WPA vs WPA2 on OS 10.3

just installed an airport card on my G4 - Quicksilver.  Running OS 10.3.  My router only recognizes a WPA2 password.  This does not seem to be an option for 10.3 as I can only type in a WPA password.  Suggestions?  Workaround?

Panther 10.3.x is ancient and may not properly work with your router. You probably need to a) log into your router and change the security level to WEP, or b) upgrade your OS X to 10.4 or 10.5.
This is what it looks like on my Tiger iMac, under "Security Options" you need to pick what level you want. WEP is less secure but more flexible with a Mixmaster of devices, while WPA2 is more secure but may be less compatible with certain devices.
I have a Netgear router. You'll need to know the login ID and password for your router, then login and make changes. (The default is usually "admin" and "password" but I would highly recommend changing it if you haven't already done so, for security reasons.)
You can have an idea of what the settings look like below. I blocked out my KEY for obvious reasons.

Similar Messages

  • What's the security difference between WPA and WPA2 Personal?

    In order to get my G4 iMac (OS 10.4.11) onto my new AEBS(b/g/n) wi-fi network, I had to drop the network security down from WPA2 Personal to WPA/WPA2 Personal.
    What are the potential security risks in this mode? I know that WEP is no longer secure, so I'm concerned about WPA also being vulnerable.
    If there's a good online explanation of these security differences (not necessarily Apple-only), you just give me that link.
    Thanks

    Hi,
    Summary:
    1.WPA2 is the improved version of WPA
    2.WPA only supports TKIP encryption while WPA2 supports AES
    3.Theoretically, WPA2 is not hackable while WPA is
    4.WPA2 requires more processing power than WPA
    http://www.differencebetween.net/technology/difference-between-wpa-and-wpa2/

  • WPA or WPA2 on Vista?

    I got a Linksys WRT54GL router, and it supports WPA and WPA2.  I have a PC60G installed in a 32-bit Vista machine.  I configured the router for WPA2, and the Vista machine would not connect to it.  Then I configured the router for WPA, and the Vista machine still could not connect to it.  Only after I configured the router for WEP was the Vista machine finally able to connect to it.
    Does anyone have a PC60G on a 32-bit Vista machine connecting to a router using WPA or WPA2?

    Sometimes it simply doesn't work together using the protocol you like.
    Windows has very poor WPA compatibility, switch to WEP is that does work.
    Else try a different brand router and see if it works, Wifi simply has such problems.
    That's why I use cables if I can

  • WPA versus WPA2, must you support both?

    Is it generally a requirment to support both WPA and WPA2 for enterprise?
    Sent from Cisco Technical Support Android App

    I would say no. I might suggest supporting one or the other. Some clients when seeing both supported on the same WLAN will have issues in negotiation.
    Sent from Cisco Technical Support iPhone App

  • How to set WPA and WPA2 security with multiple AEs

    Hi Everybody,
    I have purchased a second AE and with the help of Alan Summers was able to set them all up for multiple speakers use in iTunes. In order to make them run I had to downgrade security settings to 40-bit WEP which is not really satisfying. My Airport Admin. Utility was still 4.0, so I tried 4.2 which offers the use of WPA and WPA2 with multiple AEs. Upgraded to 4.2 and switched off security settings first. Both AE are recogniced and speakers of second AE also show up in iTunes but I cannot connect to them. Since it didn't work without security settings, I didn't even try with it and went back using 4.0. All other firmware is up-to-date:
    AirPort Express 6.3
    iTunes 6.0.2
    Intel(R) PRO/Wireless 2200BG Network Connection 9.0.3.0
    Any advice would deeply be appreciated!
    BTW - if it works, it's maybe the greatest sound experience I ever had. Music all over the place!!
    Best regards
    Roman

    Found it!!
    1) upgrade Airport Admin. Utility to 4.2
    2) set second AE as "remote base station" and not in "client mode" (that's the clue!!)
    3) follow instructions and type in MAC address of main base station
    4) choose a channel (doesn't matter which one, just has to be the same on both AEs)
    5) choose your personal WPA and WPA2 password (same on both AEs)
    6) restart both AEs
    7) enjoy the music all over the place!
    Best regards
    Roman

  • New iPad won't connect to Mobile Hotspot using WPA or WPA2

    I have a new iPad running iOS 6.01.  It connects to wifi networks perfectly.  I also own a Blackberry 9790 that is capable of running a wifi hotspot.  When I try to connect my iPad to the mobile hotspot when WPA or WPA2 Encryption is used the iPad cannot connect.  If I change the Encrypstion to WEP I am able to connect the iPad and wifi works on it.
    Is there a reason the new iPad won't connect to a mobile hotspot that's using WPA/WPA2?  Is there a way to resolve this issue?
    I am able to connect my MacBook Pro to the mobile hotspot using WPA/WPA2 so I know that it's not my phone or the hotspot not working properly.
    Thanks

    It appears as though I fixed my own problem...I hadn't yet tried restarting my blackberry or my iPad since I had been trying to setup the mobile hotspot and connect the iPad.  Anyways, I restarted both devices and then tried connecting using WPA/WPA2 and it worked.
    iPad is now connecting to my mobile hotspot using WPA/WPA2 with no problems.
    Maybe try doing the same if you haven't.

  • Difference between WEP, WPA, and WPA2 and better suggestion to use for shared family users

    What is the difference between WEP, WPA, and WPA2? My router is set up on my family PC and connected to a modem so I access Wi-fi through my laptop and my sister has a laptop too and uses our family network to get internet. I just set up a WPA today, so will we all be able to get internet (along with my family using the pc, and my sis on her laptop, even at the same time) protected? (like nobody else using our network)

    Wired Equivalent Privacy, commonly called WEP is 802.11's first hardware form of security where both the WAP and the user are configured with an encryption key of either 64 bits or 128 bits in HEX. So when the user attempts to authenticate, the AP issues a random challenge. The user then returns the challenge, encrypted with the key. The AP decrypts this challenge and if it matches the original the client is authenticated. The problem with WEP is that the key is static, which means with a little time and the right tool a hacker could use reverse-engineering to derive the encryption key. It is important to note that this process does affect the transmission speed.
    WPA builds upon WEP, making it more secure by adding extra security algorithms and mechanisms to fight intrusion.
    WiFi Protected Access (WPA) is the new security standard adopted by the WiFi Alliance consortium. WiFi compliance ensures interoperability between different manufacturer’s equipment.WPA delivers a level of security way beyond anything that WEP can offer, bridges the gap between WEP and 802.11i networks, and has the advantage that the firmware in older equipment may be upgradeable.
    WPA2 is based upon the Institute for Electrical and Electronics Engineers’ (IEEE) 802.11i amendment to the 802.11 standard, which was ratified on July 29, 2004. The primary difference between WPA and WPA2 is that WPA2 uses a more advanced encryption technique called AES (Advanced Encryption Standard), allowing for compliance with FIPS140-2 government security requirements. 

  • HT1178 What the difference is between WPA and WPA2 and how are these settings affecting the access of other computers to the internet through my Time Capsule

    I have a Time Capsule of the 4th generation and I am pretty impressed since I just had a fried harddrive on my 3 month old Imac and Time Capsule restored it fully including all programs etc. without having me to put in all serial numbers etc. for that I give it an A+. However what I find very frustrating is the very short and incomplete user manual and setup instructions. I give those a D-. It does not explain the consequences of certain choices to a normel non computer gig user like me:
    I do not understand what the consequences and difference is between the security setting WPA/WPA2 and WPA2 when setting it up. It would be helpful if the manual would explain something like: If you set it onto WPA2 then computers older than XXX years will not able to hook up to the internet through your router...or the likes, since I slowly supect this may be the reason for some of my troubles.
    I also have a 5 year old PC with vista connected to the Time Capsule. It can wireless connect to the Time Capsule and access the printer (I have managed that after some painful hours...) but it cannot access the internet with that PC through the timecapsule wireless, only if I hook it up with a cable. Why? Does that have to do with the fact that I have set the TIme Capsule to WPA2?
    Our PS3 can connect wireless, no problem. However, I friend of mine tried it with a quite new Toshiba Notebook and he could see the Time Capsule but again it shows the line from the Time Capsule to the internet blocked. All other computers linked with data cable to the Time Capsule are connected to the internet no problem. What have we done wrong? Should I change the security setting to WPA/WPA2?
    I tried the latter, but then another problem does come up, which was there from beginning on: When I change the settings for my Time Capsule my Imac suddenly cannot find the Timne Capsule anymore, even so I am only 3feet away from it. When I set it up for the first time 3 month ago it drove me crazy. The very first time it found the Time Capsule right away. But when I discuverd a mistake in my initial setup and I went through the settings again to change stuff it suddenly could not find the Time Capsule anymore. Only after frustrating 20 times or so with turning wi-fi on and off several times inbetween did it suddenly find the Time Capsule in the set up menu. However, when I tried changing my security setting to WPA/WPA2 today to see whether this solves my other problems again it could not find the Time Capsule when I was finished with the settings and I had to give up/cancel. Why is that???
    I would really appreciate some help here. But please I am not a computer gig and normally always had assistance with these things. On the other hand I am not all stupid either (even so these manuals assuming we all grew up sleeping on a computer make me feel stupid).....
    Thank you all in advance

    Hello Schimi. The Time Capsule is a kind of product that offer you two possibility:
    - To use the TC as a router or as an external HD.
    The difference between WPA and WPA 2 are:
    - They are two kinds of internet connection.
    WPA uses dynamic key encryption , which means that the key is constantly changing and makes the invasion of a wireless network more difficult than WEP . WPA is considered one of the highest levels of wireless security for your network and is recommended if your devices support this kind of encryption . Newer routers offer WPA2 security . WPA2 is compatible with WPA , but offers higher security level . In fact, it meets the high standards of many government agencies . If the router and computer support WPA2 , this should be your choice.
    If you need any help or if you find some difficult setting up it you can contact Apple Support.
    I am sure that they can help you with that.
    I am sory for the delay. I holpe that you solve your issue.

  • WPA-TKIP WPA2-AES Connection speed

    Hi,
    My customer uses controller based wireless network. There is a connection speed problem between two SSID's. First SSID uses WPA(TKIP+AES) and WPA2(TKIP+AES) encryption method and dot1x authentication method. Second SSID uses open authentication (this is a guest SSID)
    802.11 a/n/ac is enable on WLC and client can connect with these methods. But clients connect to the first SSID with 802.11 b/g (54 Mbps) and connect to the second SSID with 802.11 a/n/ac. Customer wants to know why our clients connect with low speed to first SSID even if a/n/ac is enable.
    Sometimes WPA-TKIP encryption methods can reduce the connection speed. Do you have any idea about that and official document about this problem?
    Thanks,
    Burhan,

    TKIP and AES are two different types of encryption that can be used by a Wi-Fi network. TKIP stands for “Temporal Key Integrity Protocol.” It was a stopgap encryption protocol introduced with WPA to replace the very-insecure WEP encryption at the time. TKIP is actually quite similar to WEP encryption. TKIP is no longer considered secure, and is now deprecated. In other words, you shouldn’t be using it.
    AES stands for “Advanced Encryption Standard.” This was a more secure encryption protocol introduced with WPA2, which replaced the interim WPA standard. AES isn’t some creaky standard developed specifically for Wi-Fi networks; it’s a serious worldwide encryption standard that’s even been adopted by the US government. For example, when you encrypt a hard drive with TrueCrypt, it can use AES encryption for that. AES is generally considered quite secure, and the main weaknesses would be brute-force attacks (prevented by using a strong passphrase) and security weaknesses in other aspects of WPA2.
    The “PSK” in both names stands for “pre-shared key” — the pre-shared key is generally your encryption passphrase. This distinguishes it from WPA-Enterprise, which uses a RADIUS server to hand out unique keys on larger corporate or government Wi-Fi networks.
    In summary, TKIP is an older encryption standard used by the old WPA standard. AES is a newer Wi-Fi encryption solution used by the new-and-secure WPA2 standard. In theory, that’s the end of it. But, depending on your router, just choosing WPA2 may not be good enough.
    While WPA2 is supposed to use AES for optimal security, it also has the option to use TKIP for backward compatibility with legacy devices. In such a state, devices that support WPA2 will connect with WPA2 and devices that support WPA will connect with WPA. So “WPA2″ doesn’t always mean WPA2-AES. However, on devices without a visible “TKIP” or “AES” option, WPA2 is generally synonymous with WPA2-AES.
    WPA and TKIP compatability options can also slow your Wi-Fi network down. Many modern Wi-Fi routers that support 802.11n and newer, faster standards will slow down to 54mbps if you enable WPA or TKIP in their options. They do this to ensure they’re compatible with these older devices.
    In comaprison, even 802.11n supports up to 300mbps — but, generally, only if you’re using WPA2 with AES. Theoretically, 802.11ac offers theoretical maximum speeds of 3.46 Gbps under optimum (read: perfect) conditions.
    In other words, WPA and TKIP will slow a modern Wi-Fi network down. It’s not all about security!

  • Automomous AP not broadcasting SSID and can I get it to support both WPA and WPA2?

    Ok, I am playing around with a 3702i that has been converted to Autonomous running ap3g2-k9w7-mx.153-3.JAB
    I have 2 issues I have not been able to solve yet.   I have basically set it up using the web interface....
    First, I can't get the SSID to broadcast -- the SSID is active, because I can type it in manually.
    Second, I have an HP 8600 Pro All-in-One printer that I normally connect over WiFi.  Basically, it does not seem to support WPA2...I spent most of yesterday pouring through HP forums and WPA2 support seems to be a issue.  My old Linksys router had a setting that supported WPA/WPA2...does anyone know how or if I can support WPA / WPA2 simultaneously on this Autonomous AP?
    Here is my config:
    Thanks....
    Cisco3702#sh run br
    Building configuration...
    Current configuration : 3867 bytes
    ! Last configuration change at 12:44:59 -0500 Tue Mar 9 1993
    ! NVRAM config last updated at 11:29:23 -0400 Sat Oct 18 2014
    ! NVRAM config last updated at 11:29:23 -0400 Sat Oct 18 2014
    version 15.3
    no service pad
    service timestamps debug datetime msec
    service timestamps log datetime msec
    service password-encryption
    hostname Cisco3702
    logging rate-limit console 9
    no logging console
    enable secret 5 XXXXXXXXXXXX.
    no aaa new-model
    clock timezone -0500 -5 0
    clock summer-time -0400 recurring
    no ip source-route
    no ip cef
    ip domain name mydomain.com
    ip name-server 192.168.6.254
    dot11 syslog
    dot11 activity-timeout unknown default 300
    dot11 activity-timeout client default 300
    dot11 ssid MYSSID
       band-select
       authentication open
       authentication key-management wpa version 2
       infrastructure-ssid
       wpa-psk ascii 7 XXXXXXXXXXXX
    dot11 network-map
    dot11 arp-cache optional
    crypto pki trustpoint TP-self-signed-2632604960
     enrollment selfsigned
     subject-name cn=IOS-Self-Signed-Certificate-2632604960
     revocation-check none
     rsakeypair TP-self-signed-2632604960
    crypto pki certificate chain TP-self-signed-2632604960
     certificate self-signed 01
    username CISCO password 7 XXXXXXXX
    username ADMIN privilege 15 secret 5 XXXXXXXXXXXX
    bridge irb
    interface Dot11Radio0
     no ip address
     encryption mode ciphers aes-ccm
     ssid MYSSID
     antenna gain 0
     stbc
     speed  basic-11.0 basic-6.0 basic-9.0 basic-12.0 basic-18.0 basic-24.0 basic-36.0 basic-48.0 basic-54.0 m0. m1. m2. m3. m4. m5. m6. m7. m8. m9. m10. m11. m12. m13. m14. m15. m16. m17. m18. m19. m20. m21. m22. m23.
     channel 2412
     station-role root access-point
     dot11 qos class video local
        admission-control
        admit-traffic signaling infinite
     dot11 qos class voice local
        admission-control
        admit-traffic narrowband max-channel 75 roam-channel 6
     dot11 qos class video cell
        admission-control
     dot11 qos class voice cell
        admission-control
     bridge-group 1
     bridge-group 1 subscriber-loop-control
     bridge-group 1 spanning-disabled
     bridge-group 1 block-unknown-source
     no bridge-group 1 source-learning
     no bridge-group 1 unicast-flooding
    interface Dot11Radio1
     no ip address
     encryption mode ciphers aes-ccm
     ssid MYSSID
     antenna gain 0
     peakdetect
     dfs band 3 block
     stbc
     speed  basic-6.0 basic-9.0 basic-12.0 basic-18.0 basic-24.0 basic-36.0 basic-48.0 basic-54.0 m0. m1. m2. m3. m4. m5. m6. m7. m8. m9. m10. m11. m12. m13. m14. m15. m16. m17. m18. m19. m20. m21. m22. m23. a1ss7 a2ss7 a3ss7
     channel dfs
     station-role root access-point
     dot11 qos class video local
        admission-control
        admit-traffic signaling infinite
     dot11 qos class voice local
        admission-control
        admit-traffic narrowband max-channel 75 roam-channel 6
     dot11 qos class video cell
        admission-control
     dot11 qos class voice cell
        admission-control
     bridge-group 1
     bridge-group 1 subscriber-loop-control
     bridge-group 1 spanning-disabled
     bridge-group 1 block-unknown-source
     no bridge-group 1 source-learning
     no bridge-group 1 unicast-flooding
    interface GigabitEthernet0
     no ip address
     duplex auto
     speed auto
     bridge-group 1
     bridge-group 1 spanning-disabled
     no bridge-group 1 source-learning
    interface BVI1
     mac-address 58f3.9cea.5d20
     ip address 192.168.6.253 255.255.255.0
     ipv6 enable
    ip forward-protocol nd
    ip http server
    ip http secure-server
    ip http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag
    snmp-server view dot11view ieee802dot11 included
    snmp-server community public view dot11view RO
    snmp-server location Home
    snmp-server chassis-id Cisco3702i
    bridge 1 route ip
    line con 0
    line vty 0 4
     login local
     transport input all
    sntp server 173.255.227.205
    sntp broadcast client
    end

    Hi
    You have to add "guest mode" command to broadcast your SSID. Also if you need WPA/TKIP support then remove version 2 keyword under SSID & add TKIP option under radio interface encryption config. Also get rid of "infrastructure SSID" command under SSID config.
    dot11 ssid MYSSID
       band-select
       authentication open
       authentication key-management wpa version 2
       infrastructure-ssid
       wpa-psk ascii 7 XXXXXXXXXXXX
      guest mode
    interface Dot11Radio1
     encryption mode ciphers aes-ccm tkip
    Pls do not forget to rate all useful responses 
    HTH
    Rasika

  • WPA and WPA2 mixed environment

    I have about 30 or so autonomous AP's installed on our campus. Half are 1141n and half are 1231 with radios that cannot do wpa2. Right now we are running ciphers tkip and autherntication wpa on all units.
    I would like to change ciphers to aes-ccm on all units and change to wpa2 on the 1141n units but retain wpa on the older 1131's because they are not capable of wpa2.
    Will clients be able to roam seemlessly around the campus without having to manually re-associate whenever they move from a 1141n unit to 1231 unit given the proposed change listed above?

    Hello John,
    i would say this will differ based on client software itself.
    however i see you concerned as some old AP's will not have WPA version 2 commands under SSID.
    can you please check in one of these old AP's , under the radio
    conf t
    interface dot11radio X
    encryption mode cipher AES ( is this command availble)?
    if yes , i believe it should be find if you do  WPAv2 -AES on 1140 , and 1230 with AES encryption.
    Kind regards
    Talal

  • HUB3 WPA NOT WPA2

    I have a HUB3. It shows WPA on the security service. How do I get WPA2 the latest. I phoned BT and after 54 minutes was told HUB3 only gets WPA, but other signals I see with a HUB3 show WPA2.
    Solved!
    Go to Solution.

    Have a look here
    http://bt.custhelp.com/app/answers/detail/a_id/381​41/session/L2F2LzEvdGltZS8xNDMyMjE0NTczL3NpZC8yM29​...

  • WRT54GS v1.1 (4.71.4): Wifi won't work with wpa/wep/wpa2

    Yesterday, I was using wi-fi connection normally when it just died without any warning. It was only my netbook that couldn't use the connection, my phone and other laptop were able to connect and transmit with wpa2-personal (tkip-aes) on. Now they aren't working either. Strange isn't it?
    I tried to switch wifi's channel with no help, but I discovered that if I disable the security completely from the router it start's to work. With any security on dhcp wont even give any IPs for the devices trying to connect.
    Has anyone else experienced such death with this model? What could be the reason?

    [SOLVED]
    I followed these instructions to install a third party firmware after my mate's recommendation. Wi-fi began to work straight away!
    http://www.dd-wrt.com/wiki/index.php/Linksys_WRT54GS_v1.1
    Warning: There is a risk to break your router by following these instructions, don't know how big it is but if you can't take that chance then don't try this
    Edit. I guess that user cant edit thread title to add that the problem is solved?

  • Support for WPA-Enterprise, WPA2-Enterprise wifi s...

    hi all
    I try to connect my phone to corporate wifi but failed because the phones hangs. my company uses WPA2-Enterprise wifi. my phone clearly works with WPA2-Personal wifi security at home. will these profiles of security be supported in future update?

    Although this is the right section for this question, let us continue with your original post …

  • Connecting to WPA/WPA2-Enterprised network

    hi all,
    i just came to mcgill and was trying to connect to the school network. But it kept saying something like 'authorization failed'. School website has only instructions for BlackBerrys:
    "Select wpa.mcgill.ca * (WPA/WPA2-Enterprise). Fill in the following fields:
    Name: wpa.mcgill.ca *
    SSID: wpa.mcgill.ca *
    Security Type: PEAP
    User Name: McGill Username
    User password: McGill Password
    CA Certificate: Thawte Premium Server CA
    Inner Link Security: EAP-MS-CHAP V2
    Token: None Selected
    Server subject: blank
    Server San: blank                                                                         "
    Help plz
    Solved!
    Go to Solution.

    idecline wrote:
    hi all,
    i just came to mcgill and was trying to connect to the school network. But it kept saying something like 'authorization failed'. School website has only instructions for BlackBerrys:
    "Select wpa.mcgill.ca * (WPA/WPA2-Enterprise). Fill in the following fields:
    Name: wpa.mcgill.ca *
    SSID: wpa.mcgill.ca *
    Security Type: PEAP
    User Name: McGill Username
    User password: McGill Password
    CA Certificate: Thawte Premium Server CA
    Inner Link Security: EAP-MS-CHAP V2
    Token: None Selected
    Server subject: blank
    Server San: blank                                                                         "
    Help plz
    Try configuring your N97 with these instructions:
    Since your WLAN network seems to require more advanced PEAP authentication settings you should probably create / edit appriate WLAN connection profile, known as (Internet) Access Point, manually in a following manner:
    1. Go to Tools -> Settings -> Connection -> Network Destinations
    2. Check if your earlier failed attempt to connect has already created an non-funtional IAP named as your WLAN network SSID (look for a entry named wpa.mcgill.ca) under "Internet" destination.
    3. If you can see existing IAP named as your WLAN SSID then you can Edit that one with necessary changes. (skip to 7.)
    4. If you don't see any existing IAPs that are named like your WLAN network then go to the desired "Destination" (e.g. Internet) and select Options -> Add Connection Method.
    5. Assuming you are in the coverage area of your WLAN network you can let phone "Automatically check for connection methods" (i.e. phone scans available WLAN networks) and you should be able to select the correct WLAN network name (wpa.mcgill.ca) from the list. Once you have selected the WLAN network your "Internet" Destination should now have been added with a new Access Point (IAP) that is named "wpa.mcgill.ca". Note that at this point the particular connection method is still incorrectly configured for your purposes (since by defaul it has EAP-SIM & EAP-AKA authentication methods enabled).
    6. Now you should manually Edit your newly created wpa.mcgill.ca Internet Access Point with necessary PEAP settings.
    7. Configure following WLAN and authentication settings:
      "Connection name" defaults to name of your WLAN network (wpa.mcgill.ca) but you can also change this if you wish
    - "Data Bearer" naturally needs to be "Wireless LAN"
    - "WLAN network name" should match your WLAN network's name (SSID) exactly (wpa.mcgill.ca)
    - "Network status": Public
    - "WLAN network mode": Infrastructure
    - "WLAN Security mode": WPA/WPA2
     => Go to "WLAN security settings"
    - Ensure that "WPA/WPA2 mode is set to "EAP"
    - Leave "WPA-2 Only mode" to "OFF" unless you are absolutely sure that your WLAN network is configured to stricly pure WPA2 mode (i.e. network might be configured to support both WPA and WPA2 security thus enabling WPA-2 Only mode on the phone will cause all your connection attempts to fail).
     => Go to "EAP plug-in configuration"
    - Enable "EAP-PEAP" and make sure that "EAP-SIM" and "EAP-AKA" are disabled (via Options -> Disable)
     => Select "Configure" for EAP-PEAP authentication method
     - Leave "Personal Certificate" to "Not defined"
    - Select "Thawte Premium Server CA" to be used as an "Authority certificate"
    - Set "User name in use" to "User defined" (since there is no Personal Certificate where it could be read automatically)
    - Enter your username (McGill Username) to "Username" field
    - Set "Realm in use" to "User defined" and leave following "Realm" field empty.
    - Note that in case your username (McGill Username) contains the realm (i.e. format is username@realm ) then you can enter realm part of your ID to "Realm" field and enter only the username part to the "Username" field.
    - Configure "Allow PEAPv0" to Yes
    - Configure both "Allow PEAPv1" and "Allow PEAPv2" to "No"
    => Go to "EAP's" tab to configure inner authentication method for the PEAP (use the small arrow pointing right on top of the screen to move between tabs)
    - Enable "EAP-MSCHAPv2" authentication method and Disable all other methods (Option -> Enable / Disable)
    - Select "Edit" for the EAP-MSCHAPv2
    - Enter you username (McGill Username) to "User name" field
    - Configure "Prompt password" to No or Yes depending on whether you want your password to be prompted everytime you make an connection or if you prefer saving your password to following "Password" field permanenly so that it won't be prompted during everytime you connect to this WLAN network with PEAP/EAP-MSCHAPv2 authentication.
    - If you you selected "No" to password prompting then enter your password (McGill Password) to "Password" field.
    => Exit the configuration with "Back" (several times) and you should hopefully be able to connect with this setup.
    If needed you can also change the priority order of the connection methods (IAP's) within the Internet Destination since your new connection most likely ended up being lowest priority WLAN connection within your Internet destination. This should however not be a problem unless you have some other WLAN networks defined as an IAP and these other WLAN networks are simultaneously available at the location of the wpa.mcgill.ca WLAN network.
    Hope this helps you to get connected!!
    Message Edited by saataja on 17-Sep-2009 05:16 PM

Maybe you are looking for