Table Of Contents
Network Decision Tree Flow Diagram
Network Decision Tree Flow Diagram
The following illustration provides an overview of the XML schema decision tree for configuring a network connection and serves as a graphical index to the corresponding sections in Chapter 2, "Schema Elements." Refer to the legend for a link to the detailed configuring steps and element descriptions.
Figure A-1 Network Configuring High Level Fow Diagram
Legend for Figure A-1.
1.
Configure a network
–
Configuring Networks
2.
Choosing the network media
–
Choosing a Network Media Type
3.
Wi-Fi security class
–
Choosing the Wi-Fi Network's Security Class
4.
Wired security class
–
Choosing the Wired Network's Security Class
5.
Wi-Fi open network, user connection occurrence
–
Configuring an Open Wi-Fi Network
6.
Wi-Fi shared key network, connection context
–
Configuring a Shared-key Wi-Fi Network
–
Configuring a Shared-key, Machine Network
7.
Wi-Fi shared key network, user connection occurrence
–
Configuring a Shared-key, User Network
8.
Wi-Fi shared key network, shared key
–
Choosing the Shared-key Type
9.
Wi-Fi/wired authentication network, connection context
–
Configuring an Authenticating Wi-Fi Network
–
Configuring an Authenticating Wired Network
–
Choosing the Authentication Network's Connection Context
–
Configuring an Authenticating, Machine and User Network
10.
Wi-Fi/wired authentication network, machine connection context, credentials
–
Configuring an Authenticating, Machine-only Network
–
Configuring the Authenticating, Machine Credential Source Elements
11.
Wi-Fi/wired authentication network, user connection occurrence
–
Configuring an Authenticating, User-Only Network
–
Configuring the Authenticating, User-Only Connection Occurrence Elements
12.
Wi-Fi/wired authentication network, user connection context, credentials
–
Configuring the Authenticating, User Credential Source (1) Elements
–
Configuring the Authenticating, User Credential Source (2) Elements
13.
Wi-Fi/wired authentication network, EAP methods
–
Choosing Wi-Fi EAP Methods
–
Choosing Wired EAP Methods
14.
Wi-Fi/wired authentication network, server validation
–
Configuring Server Validation
–
Configuring Certificate Trusted Server Rules
–
Configuring PAC Trusted Server Rules
–
Adding CA Certificates