User's Manual
44 45
Choose Between Microsoft and Funk Security
The computer supports both Funk and Microsoft security, which dynamically select wireless
networks based on your preferences. The option you choose depends on your network security
needs.
• If you are using the computer in a static environment that requires a high level of security,
you should use Funk security, which offers CCX v4.0 compliance, support for LEAP and TTLS,
and conguration for up to four proles. To use Funk security, you need to select a prole. For
help, see the next section, Select a Funk Security Prole.”
• If you are primarily using the computer to connect to Wi-Fi hotspots, you may want to use
Microsoft security. To use Microsoft security, you need to select it as your security choice. For
help, see Select Microsoft as Your Security Choice” on page 90.
Select a Funk Security Profile
You can dene up to four proles for Funk security. Different proles let your computer communi-
cate in different networks without having to change all of your security settings. For example, you
may want to set up one prole for the manufacturing oor and one for the warehouse. By default,
the active prole is Prole 1.
Select a Funk Security Profile
Use the following procedure to select a Funk security prole.
1 Start ecom instruments Settings.
2 Choose Communications > 802.11 Radio > Funk Security.
3 Choose a prole. A list of congurable settings appears.
4 (Optional) In the Prole Label text box, enter a meaningful name for your prole.
5 Congure your security settings. For help, see the next sections.
6 Repeat Steps 3 through 5 for each prole you want to dene.
7 Set an active prole by choosing it in the Active Prole list.
8 Save your settings.
Configure WPA or WPA2 Enterprise (802�1x) Security With Funk
Use these procedures to set WPA-802.1x or WPA2-802.1x security on your computer with Funk
security.
1 Make sure the communications and radio parameters on your 70 Series are congured.
2 Make sure Funk is selected as your security choice.
3 Start ecom instruments Settings.
4 Choose Communications > 802.11 Radio > Funk Security.
5 Select the prole you want to congure.
6 For Association, choose WPA or WPA2. Encryption automatically defaults to TKIP or AES,
respectively.
7 For 8021x, choose TTLS, PEAP, EAP-FAST, or TLS.
8 If you choose TTLS, EAP-FAST, or PEAP:
a For Prompt for Credentials, choose Enter credentials now.
b Enter a User Name and User Password.
c For Validate Server Certicate, choose Yes.
Note: The correct date must be set on your computer when you enable Validate
Server Certificate�
Create a VPN Server Connection
You can create a Virtual Private Network (VPN) connection to securely connect to servers, such as
a corporate network, through the Internet. Before you can create a VPN connection, you need this
information from your network administrator:
• User name
• Password
• Domain name
• TCP/IP settings
• Host name or IP address of the VPN server
After you have located this information, you can create a VPN server connection.
1 Tap Start > Settings > Connections > Connections.
2 Under My Work Network, tap Add a new VPN server
connection.
3 Step through the screens to set up your VPN connection.
About Wireless Security
The computer provides ve types of security for your wireless network:
• Wi-Fi Protected Access 2 (WPA2™)
• Wi-Fi Protected Access (WPA)
• 802.1x
• LEAP
• WEP
This section explains how to congure wireless security on your mobile computer. ecom instru-
ments recommends that you implement WPA2 security using PSK (Personal) or 802.1X (Enter-
prise) key management as appropriate.
You must use either Funk or Microsoft security to implement your security solution. For details,
see the next section, Choose Between Microsoft and Funk Security.” ecom instruments recom-
mends that you always implement WPA2 security using PSK (Personal) or 802.1X (Enterprise) key
management.
If you are using WPA-802.1x, WPA2-802.1x, or 802.1x security, this section also assumes that your
authentication server and authenticators are properly congured.
Note: Your security choice does not depend on your authentication server�
For example, you can choose Funk security if you use Microsoft Active Directory®
to issue certificates�