Intermec CN3 Manual de usuario Pagina 170

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 212
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 169
Chapter 5 — Network Support
156 CN3 Mobile Computer User’s Manual
The debug output file is then stored in the “\My Device” root folder as a
text file called “uroddsvc.” Using File Explorer, press and hold your
stylus on this file for its pop-up menu, then select any of its options to
copy, beam, send, or delete this file.
Configuring Security
The CN3 provides three types of security for your wireless network:
Wi-Fi Protected Access 2 (WPA2/802.11i)
•WPA
WEP. 802.1x (should be referred to as an authentication method used
for WPA and WPA2)
Another authentication method for WPA and WPA2 would be the Pre-
Shared Key (PSK).
Intermec recommends that you use the Intermec Settings applet to
configure your security. See the Intermec Computer Command Reference
Manual (P/N 073529) available online at www.intermec.com for more
information on using this applet.
Use the following information to better understand how to configure each
type of security on your wireless CN3.
Choosing Between Microsoft and Funk Security
Before you can implement a security solution on the CN3, you need to
choose between Microsoft and Funk security:
By default, Funk security is enabled. It provides everything you get with
Microsoft security plus the addition of Cisco Compatible Extensions
features. It also provides additional authentication types like EAP-TTLS,
LEAP, and EAP-FAST.
Microsoft security, with its Microsoft Zero Config feature, is also
available. To switch to Microsoft security, go to “Configuring Microsoft
Security” on page 175 to start.
Configuring Funk Security
You can define up to four profiles for your Funk Odyssey security.
Different profiles let your CN3 communicate in different networks
without having to change all of your security settings. For example, you can
set up one profile for the manufacturing floor and one for the warehouse.
Note: Your security choice does not depend on your authentication server.
For example, you can choose Funk security if you use Microsoft Active
Directory® to issue certificates.
Vista de pagina 169
1 2 ... 165 166 167 168 169 170 171 172 173 174 175 ... 211 212

Comentarios a estos manuales

Sin comentarios