3b
For TLS, provide Identity, Client Certicate, Client Key, and Client Key
Password. To increase security, you can also congure a Server Certicate
used to validate the server's authenticity.
TTLS and PEAP require Identity and Password, whereas Server Certicate
and Anonymous Identity are optional.
3c
To enter the advanced authentication dialog for your WPA-EAP setup, click
Details.
3d
Select the Authentication Method for the second stage of EAP-TTLS or EAP-
PEAP communication (inner authentication). The choice of methods depends
on the authentication method for the RADIUS server you selected in the
previous dialog.
3e
If the automatically-determined setting does not work for you, choose a spe-
cic PEAP Version to force the use of a certain PEAP implementation.
4
Conrm your changes with OK. The Overview tab shows the details of your newly
congured WLAN card.
5
Click OK to nalize the conguration and to leave the dialog.
24.5.3 Establishing an Ad-Hoc Network
In some cases it is useful to connect two computers equipped with a WLAN card. To
establish an ad-hoc network with YaST, do the following:
1
Start YaST and open the Network Settings dialog.
2
Switch to the Overview tab, choose your wireless card from the list and click
Edit to open the Network Card Setup dialog.
3
Choose Statically assigned IP Address and enter the following data:
•
IP Address: 192.168.1.1. Change this address on the second computer to
192.168.1.2, for example.
•
Subnet Mask: /24
Wireless LAN 441