User's Manual
Table Of Contents
- Chapter 6 - Configure the Computer
- How to Configure the Computer
- Use Intermec Settings on the Computer
- Use Intermec Settings Remotely with SmartSystems
- About Network Communications
- About Wireless Security
- Chapter 7 - Manage the Computer
- Chapter 8 - Troubleshoot and Maintain the Computer
- Appendix A - Specifications and Default Settings
- Physical and Environmental Specifications
- CN70 Physical Dimensions
- CN70e Physical Dimensions
- CK70 Physical Dimensions
- CK71 Physical Dimensions
- Environmental Specifications
- Power and Electrical Specifications
- 70 Series Non-Incendive Computer Specifications
- Operating System
- Hardware
- Back Accessory Interface Pin-outs
- Touch Screen Specifications
- Standard Communications
- Wireless LAN
- Regulatory Approvals
- Bar Code Symbologies
- Imager Reading Distances
- EA30 Typical Reading Distances - Extended Reading Range
- EA30 Area Imager Minimum Reading Distances
- EA30 Area Imager Typical Reading Distances
- EV12 Linear Imager Minimum Reading Distances
- EV12 LInear Imager Typical Reading Distances
- EX25 Near-Far Range Imager Minimum Reading Distance
- EX25 Near-Far Range Imager Typical Reading Distance
- Default Configuration
- Physical and Environmental Specifications
- Appendix B - Keypads and Keystrokes
- Appendix C - ScanNGo Wi-Fi Configuration Bar Codes
- Index
Chapter 6 — Configure the Computer
92 70 Series Mobile Computer User Manual
About Wireless Security
The computer provides five types of security for your wireless network:
• Wi-Fi Protected Access 2 (WPA2™)
• Wi-Fi Protected Access (WPA)
• 802.1x
• LEAP
• WEP
This section explains how to configure wireless security on your
mobile computer. Intermec recommends that you implement WPA2
security using PSK (Personal) or 802.1X (Enterprise) key management
as appropriate.
You must use either Funk or Microsoft security to implement your
security solution. For details, see the next section, “Choose Between
Microsoft and Funk Security.” Intermec recommends that you
always implement WPA2 security using PSK (Personal) or 802.1X
(Enterprise) key management.
If you are using WPA-802.1x, WPA2-802.1x, or 802.1x security, this
section also assumes that your authentication server and
authenticators are properly configured.
Choose Between Microsoft and Funk Security
The computer supports both Funk and Microsoft security, which
dynamically select wireless networks based on your preferences. The
option you choose depends on your network security needs.
• If you are using the computer in a static environment that requires
a high level of security, you should use Funk security, which offers
CCX v4.0 compliance, support for LEAP and TTLS, and
configuration for up to four profiles.
To use Funk security, you need to select a profile. For help, see the
next section, “Select a Funk Security Profile.”
Note: Your security choice does not depend on your authentication
server. For example, you can choose Funk security if you use Microsoft
Active Directory® to issue certificates.