Cisco Secure Services Client Administrator Guide, Release 4.2
Network Decision Tree Flow Diagram

Table Of Contents

Network Decision Tree Flow Diagram


Network Decision Tree Flow Diagram


The following illustration provides an overview of the XML schema decision tree for configuring a network connection and serves as a graphical index to the corresponding sections in Chapter 2, "Schema Elements." Refer to the legend for a link to the detailed configuring steps and element descriptions.

Figure A-1 Network Configuring High Level Fow Diagram

Legend for Figure A-1.

1. Configure a network

Configuring Networks

2. Choosing the network media

Choosing a Network Media Type

3. Wi-Fi security class

Choosing the Wi-Fi Network's Security Class

4. Wired security class

Choosing the Wired Network's Security Class

5. Wi-Fi open network, user connection occurrence

Configuring an Open Wi-Fi Network

6. Wi-Fi shared key network, connection context

Configuring a Shared-key Wi-Fi Network

Configuring a Shared-key, Machine Network

7. Wi-Fi shared key network, user connection occurrence

Configuring a Shared-key, User Network

8. Wi-Fi shared key network, shared key

Choosing the Shared-key Type

9. Wi-Fi/wired authentication network, connection context

Configuring an Authenticating Wi-Fi Network

Configuring an Authenticating Wired Network

Choosing the Authentication Network's Connection Context

Configuring an Authenticating, Machine and User Network

10. Wi-Fi/wired authentication network, machine connection context, credentials

Configuring an Authenticating, Machine-only Network

Configuring the Authenticating, Machine Credential Source Elements

11. Wi-Fi/wired authentication network, user connection occurrence

Configuring an Authenticating, User-Only Network

Configuring the Authenticating, User-Only Connection Occurrence Elements

12. Wi-Fi/wired authentication network, user connection context, credentials

Configuring the Authenticating, User Credential Source (1) Elements

Configuring the Authenticating, User Credential Source (2) Elements

13. Wi-Fi/wired authentication network, EAP methods

Choosing Wi-Fi EAP Methods

Choosing Wired EAP Methods

14. Wi-Fi/wired authentication network, server validation

Configuring Server Validation

Configuring Certificate Trusted Server Rules

Configuring PAC Trusted Server Rules

Adding CA Certificates