Wireless
81
• PEAP
• TLS
• TTLS
• PWD
• LEAP.
• Touch the Phase 2 authentication drop-down list and select an authentication method.
• If required, touch CA certificate and select a Certification Authority (CA) certificate. Note:
Certificates are installed using the Security settings.
• If required, touch User certificate and select a user certificate. Note: User certificates are installed
using the Security settings.
• If required, in the Identity text box, enter the username credentials.
• If desired, in the Anonymous identity text box, enter an anonymous identity username.
• If required, in the Password text box, enter the password for the given identity.
NOTE: By default, the network Proxy is set to None and the IP settings is set to DHCP. See Configuring
for a Proxy Server on page 81 for setting connection to a proxy server and see Configuring the Device to
Use a Static IP Address on page 82 for setting the device to use a static IP address.
10. Touch Save. To connect to the saved network, touch and hold on the saved network and select
Connect to network.
11. Touch the Home button.
Configuring for a Proxy Server
A proxy server is a server that acts as an intermediary for requests from clients seeking resources from
other servers. A client connects to the proxy server and requests some service, such as a file, connection,
web page, or other resource, available from a different server. The proxy server evaluates the request
according to its filtering rules. For example, it may filter traffic by IP address or protocol. If the request is
validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting
the service on behalf of the client.
It is important for enterprise customers to be able to set up secure computing environments within their
companies, making proxy configuration essential. Proxy configuration acts as a security barrier ensuring
that the proxy server monitors all traffic between the Internet and the intranet. This is normally an integral
part of security enforcement in corporate firewalls within intranets.
1. Go to Settings.
2. Touch Network & Internet > Wi-Fi.
3. Slide the Wi-Fi switch to the On position.
4. In the network dialog box, select and touch a network.
5. Touch Advanced options.
6. Touch Proxy and select Manual.
7. In the Proxy hostname text box, enter the address of the proxy server.
8. In the Proxy port text box, enter the port number for the proxy server.
9. In the Bypass proxy for text box, enter addresses for web sites that are not required to go through the
proxy server. Use a comma “,” between addresses. Do not use spaces or carriage returns between
addresses.
mc2200-mc2700-a10-prg-en.book Page 81 Friday, September 25, 2020 10:24 AM