Skip to content

NoTouch Features: Painless Wireless Configuration

As wireless internet has become more prevalently used across all industries, NoTouch has evolved to operate seamlessly together with various Wireless LAN/WiFi/802.11/WLAN network scenarios, with or without personal or enterprise authentication methods. With NoTouch, configuration of WiFi networks is quick, easy and painless. Administrators can choose  settings within NoTouch Center, eliminating the need to visit the endpoint ever again.

Whenever a supported wireless network adapter is present, you can connect to available WiFi networks in your area. NoTouch offers three scenarios:

  1. A system administrator presets one (or multiple) allowed and configured wireless networks
  2. Users employ a graphical tool to connect to any available network that they may have access to, such as in a hotel, airplane or café
  3. A third-party tool, Network Manager, is used to bypass all of the regular NoTouch configuration methods.

How does wireless configuration work?

With NoTouch, it’s easy to setup a wireless connection. Simply open the local configuration application or go to the “Wireless LAN” tab within NoTouch Center.
Screenshot of NoTouch Wireless Configuration WindowThere are two parameters that must be set:
  1. Network name (SSID): Set this to the SSID of your wireless network.
  2. Security: Set this to your desired authentication/security method. If you just have a “WiFi password”, then select “WPA2 Personal”. If you have certificates or username/password then you’ll rather use “WPA2 Enterprise”.
Possible values include none (no security used), WEP, WPA Enterprise, WPA Personal, WPA2 Enterprise and WPA2 Personal. NoTouch supports whatever authentication method necessary for your use-case. For more information, please see the detailed article in our online knowledge base, or contact our team of dedicated support engineers at [email protected]. We are happy to help!
author avatar
epirker

NoTouch Features: Painless Wireless Configuration

As wireless internet has become more prevalently used across all industries, NoTouch has evolved to operate seamlessly together with various Wireless LAN/WiFi/802.11/WLAN network scenarios, with or without personal or enterprise authentication methods. With NoTouch, configuration of WiFi networks is quick, easy and painless. Administrators can choose  settings within NoTouch Center, eliminating the need to visit the endpoint ever again.

Whenever a supported wireless network adapter is present, you can connect to available WiFi networks in your area. NoTouch offers three scenarios:

  1. A system administrator presets one (or multiple) allowed and configured wireless networks
  2. Users employ a graphical tool to connect to any available network that they may have access to, such as in a hotel, airplane or café
  3. A third-party tool, Network Manager, is used to bypass all of the regular NoTouch configuration methods.

How does wireless configuration work?

With NoTouch, it’s easy to setup a wireless connection. Simply open the local configuration application or go to the “Wireless LAN” tab within NoTouch Center.
Screenshot of NoTouch Wireless Configuration WindowThere are two parameters that must be set:
  1. Network name (SSID): Set this to the SSID of your wireless network.
  2. Security: Set this to your desired authentication/security method. If you just have a “WiFi password”, then select “WPA2 Personal”. If you have certificates or username/password then you’ll rather use “WPA2 Enterprise”.
Possible values include none (no security used), WEP, WPA Enterprise, WPA Personal, WPA2 Enterprise and WPA2 Personal. NoTouch supports whatever authentication method necessary for your use-case. For more information, please see the detailed article in our online knowledge base, or contact our team of dedicated support engineers at [email protected]. We are happy to help!
author avatar
epirker
Celebrating Earth Day with Stratodesk NoTouch: A Green Sustainable Solution for IT

Introduction As we celebrate Earth Day today, it's crucial to reflect on how technology can…

Read more

Subscribe to our newsletter:

Back To Top