Configuring and assigning network profiles for Zoom Rooms devices
This article covers:
- How to add a network profile for ZDM
- How to configure a WiFi network profile
- Configure a Personal WiFi profile
- Configure an Enterprise WiFi profile
- Configure Proxy for WiFi profile
- Configure a Manual proxy
- Configure an Auto proxy
- How to configure an Ethernet profile
- Configure Protocols
- Configure EAP-TLS protocol
- Configure PEAP protocol
- Configure Trusted Server Certificates
- Configure Protocols
- How to assign Zoom Room devices to your ZDM network profile
Prerequisites for configuring a ZDM network profile for Zoom Rooms
- Ownership or administrative privileges on the account
- Licensed to Zoom Room
- If you plan to use Windows for Zoom Room, you should use version 1809 or higher
How to add a network profile for ZDM
For managing Zoom Rooms with ZDM, you need to add a network profile:
- Zoom’s web portal can be accessed by logging in.
- Choose Device Management from the navigation menu.
- Then click System Configuration.
- Enter your profile information.
- You will configure your network profile according to the instructions in the following sections.
How to configure a WiFi network profile
Configure a Personal WiFi profile
The following options are available after you have created your network profile following the instructions in the How to add a network profile section:
You will find the following information on the page called Configure Network Profiles:
- Name (mandatory): Indicate the name of your profile on the network.
- Description (optional): Describe your profile on the network.
- Network Type (mandatory): Select the Wi-Fi network from the drop-down list.
- Service Set Identifier (SSID): This is the name of the Wi-Fi network that you wish to connect to.
- Connectivity: If you want your devices to automatically connect to your Wi-Fi network you can select Hidden network and/or Auto-Join if your Wi-Fi network is hidden.
- Security Type: Choose your Wi-Fi encryption type by clicking the down arrow. It is possible to pick from WEP, WPA/WPA2, WPA2 Personal, WPA3 Personal, or any (Personal).
- Encryption Type (Only available for Windows): Your Wi-Fi data encryption type can be selected by clicking the down arrow.
- Password: If your Wi-Fi requires a password, enter it here.
- Proxy Setup: You may set up a proxy based on its type by clicking the down arrow, and then follow the steps in How to configure Proxy for WiFi.
- After saving, or after adding another profile, click Save.
Configure an Enterprise WiFi Profile
You can choose to configure an Enterprise WiFi profile after you have added your profile as stated in the How to add a network profile section:
Enter the following information on the Configure Network Profiles page:
- Name (mandatory):
- This is the name of the network profile that you have created.
- Description (optional):
- In this section, you can describe the network profile you have created.
- Network Type (mandatory):
- To select a Wi-Fi network, you need to click on the down arrow.
- Service Set Identifier (SSID):
- Enter the name of the Wi-Fi network you wish to connect to.
- Connectivity:
- When your Wi-Fi network is hidden, select Hidden network. If you want to automatically connect your devices to your wireless network, select Auto-Join.
- Security Type:
- Choose your Wi-Fi encryption type by clicking the down arrow. There are four types of Enterprise versions of WPA/WPA2, WPA3 Enterprise, and Any(Enterprise).
- Encryption Type (only available for Windows):
- Choose the type of Wi-Fi data encryption you want by clicking the down arrow.
- Use as Login Window Configuration:
- Login window mode is selected if you want your Mac devices to use 802.1X authentication.
Note: - This setting does not affect Windows Zoom Room devices.
- Enterprise Settings:
- You can configure protocols, authentication, and trust by clicking Protocols and Trusted Server Certificates.
-
Proxy Setup:
-
Please see the How to configure Proxy for WiFi for instructions on selecting a proxy type and setting it up.
- You can add another network profile by clicking Save or Save & Add another.
Configure Proxy for Wi-Fi
Adding more security to your Wi-Fi profile may require setting up a proxy server. Automatically or manually.
Configure a manual proxy
- Proxy Setup:
- Select Manual from the drop-down box.
- Proxy Server:
- Enter the address or host name of the proxy server.
- Proxy User Name:
- You will need to enter your username.
- Proxy Password:
- Your proxy server password is required.
Configure an Auto proxy
- Proxy Setup:
- Select Auto from the drop-down list.
- Proxy URL:
- The web address where the proxy settings are to be retrieved.
- PAC Fallback:
- If you want to ignore any Proxy Auto-Configuration (PAC) failures, select Allow direct connection if PAC is not reachable.
How to configure an Ethernet Profile
Enter the following information on the Configure Network Profiles page:
- Name (mandatory):
- This is your network profile name.
- Description (optional):
- Please describe what your profile is about.
- Network Type (only available for Windows devices):
- Choose Any Ethernet after clicking the down arrow.
- Use as Login Window Configuration:
- To use 802.1X authentication for Mac devices, choose Login Window Mode for User Logins.
- Enterprise Settings:
- Configure protocols, authentication, and trust by clicking Protocols and Trusted Server Certificates.
- After saving, or before adding another network profile, click Save and Add.
Configure Protocols
Configure EAP-TLS protocol
After selecting Protocols, configure EAP-TLS authentication by doing the following:
- Protocols:
- Choose EAP-TLS.
- User Name:
- Enter your authenticator’s username.
- (Optional) Identity Certificate:
- If you want to upload the certificate of your authenticator, click + Upload Certificate.
- (Optional) TLS Minimum Version:
- Choose the minimum TLS version.
- (Optional) TLS Maximum Version:
- Make sure the maximum version of TLS is selected.
Configure PEAP protocol
After selecting Protocols, do the following to configure PEAP tunnel authentication:
- Alternatively, if you want to prove the login credentials of your users using their computer login credentials, you can select Authenticate with the target computer’s directory credentials under Use Directory Authentication.
Note: - You can only authenticate using your Mac or Windows computer. This authentication method can only be used on Windows devices.
- User Name:
- Type in the PEAP server admin username.
- Password:
- Type in the PEAP server admin password.
- (Optional) Identity Certificate:
- Click + Upload Certificate to provide the authenticator certificate.
- Outer Identity:
- Type anything you desire if you want to hide your user identity.
Note: - Available only for macOS and iOS devices.
- (Optional) TLS Minimum Version:
- Select the minimum version for your TLS.
- (Optional) TLS Maximum Version:
- Select the maximum version for your TLS.
Configure Trusted Server Certificates
- To upload a certificate for authentication, click + Upload Certificate under Trusted Server Certificates.
- The certificate name from the authentication server can be added by clicking the + Add button under Trusted Server Certificates Names.
Note: - If desired, the certificate name can be deleted by clicking Delete.
- The option Allow trust exceptions to trust a certificate that wasn’t trusted before can be checked.
How to assign Zoom Room devices to your ZDM network profile
- Log in to Zoom’s web portal by entering your email address and password.
- Then click Device Management from the navigation menu.
- Select System Configuration from the list.
- Click on the Network tab.
- Click on the ellipsis on the far right of the screen to identify your network profile
- And then click Assign Devices.
- You can search for your devices or select them according to their enrollment status in the Assign Devices pop-up window, and then click Assign.