User's Manual Part 2
Table Of Contents
- Chapter 3 - Configuring the Computer
- Developing Applications for the Computer
- Packaging Applications for the CN3 Computer
- Installing Applications on the Computer
- Updating the System Software
- Launching Your Application Automatically
- Customizing How Applications Load on the Computer
- Configuring CN3 Parameters
- Configuring the Color Camera
- Configuring the SF51 Scanner
- Using Configuration Parameters
- Chapter 4 - Maintaining the Computer
- Chapter 5 - Network Support
- Index
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual - PRELIMINARY 147
3 If Allow Automatic PAC provisioning is checked, you can check:
• Prompt before acquiring a new PAC for notification of any incom-
ing PACs.
• Prompt before replacing a PAC for notification whether to replace a
current PAC with an incoming PAC.
4 Enter the Anonymous EAP-FAST Name as assigned for public usage.
This outer identity protects your login name or identity.
5 Click ok to return to the Security page.
Advanced
Use this page to configure additional settings for this profile.
• Detect Rogue APs:
Wireless NICs and APs associate based on the SSID configured for the
NIC. Given an SSID, the BSSID with the strongest signal is often cho-
sen for association. After association, 802.1x authentication may occur
and during authentication credentials to uniquely identify a user - these
are passed between the NIC and the AP.
The base 802.1x technology does not protect the network from “rogue
APs.” These can mimic a legitimate AP to authentication protocols and
user credentials. This provides illegal users ways to mimic legitimate
users and steal network resources and compromise security.