Intermec CV30 CV30 Fixed Mount Computer With Windows CE User's Manual - Page 50

Configuring Security on the CV30, Understanding the Wireless Network

Page 50 highlights

Chapter 3 - Configuring the CV30 Configuring Security on the CV30 The CV30 provides three types of security for your wireless network: • Wi-Fi Protected Access (WPA) • Wi-Fi Protected Access 2 (WPA2) • WEP This section explains how to configure security on your wireless CV30. If you choose not to use security, see "Disabling Security" on page 65. Intermec always recommends that you implement security. You must use either Funk or Microsoft security to implement your security solution. For details, see "Choosing Between Funk and Microsoft Security" on page 43. If you are using WPA-802.1x, WPA2-802.1x, or 802.1x WEP security, this section assumes that your authentication server and authenticators are properly configured. Note: Your security choice does not depend on your authentication server. For example, you can choose Funk security if you use Microsoft's Internet Authentication Service. Understanding the Wireless Network Your wireless radio adapter (network interface card) connects to wireless networks of two types: infrastructure and ad-hoc networks. • Infrastructure networks get you onto your corporate network and the internet. The CV30 establishes a wireless connection to an access point, which links you to the rest of the network. When you connect to a network using an access point, you are using the 802.11 b/g infrastructure mode. • ad-hoc networks are private networks shared between two or more clients. Each wireless network is assigned a name or SSID (Service Set Identifier) to allow multiple networks to exist in the same area without infringing on each other. 40 CV30 Fixed Mount Computer With Windows CE User's Manual

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118

Chapter 3 — Configuring the CV30
40
CV30 Fixed Mount Computer With Windows CE User’s Manual
Configuring Security on the CV30
The CV30 provides three types of security for your wireless
network:
Wi-Fi Protected Access (WPA)
Wi-Fi Protected Access 2 (WPA2)
WEP
This section explains how to configure security on your wireless
CV30. If you choose not to use security, see
“Disabling Security”
on page 65
. Intermec always recommends that you implement
security.
You must use either Funk or Microsoft security to implement
your security solution. For details, see
“Choosing Between Funk
and Microsoft Security” on page 43
.
If you are using WPA-802.1x, WPA2-802.1x, or 802.1x WEP
security, this section assumes that your authentication server and
authenticators are properly configured.
Understanding the Wireless Network
Your wireless radio adapter (network interface card) connects to
wireless networks of two types: infrastructure and ad-hoc
networks.
Infrastructure networks get you onto your corporate network
and the internet. The CV30 establishes a wireless connection
to an access point, which links you to the rest of the network.
When you connect to a network using an access point, you
are using the 802.11 b/g infrastructure mode.
ad-hoc networks are private networks shared between two or
more clients.
Each wireless network is assigned a name or SSID (Service Set
Identifier) to allow multiple networks to exist in the same area
without infringing on each other.
Note:
Your security choice does not depend on your
authentication server. For example, you can choose Funk security
if you use Microsoft’s Internet Authentication Service.