User's Manual

Table Of Contents
Chapter 6 — Configuring the Computer
70 Series Mobile Computer User’s Manual 77
If you are using WPA-802.1x, WPA2-802.1x, or 802.1x security, this
section also assumes that your authentication server and
authenticators are properly configured.
Choosing Between Microsoft and Funk Security
The 70 Series supports both Funk and Microsoft security, which
dynamically select wireless networks based on your preferences. The
option you choose depends on your network security needs.
If you are using the 70 Series in a static environment that requires
a high level of security, you should use Funk security, which offers
CCX v4.0 compliance, support for LEAP and TTLS, and
configuration for up to four profiles.
To use Funk security, you need to select a profile. For help, see the
next section, “Choosing Between Microsoft and Funk Security.”
If you are primarily using the 70 Series to connect to Wi-Fi
hotspots, you may want to use Microsoft security.
To use Microsoft security, you need to select it as your security
choice. For help, see
“Selecting Microsoft as Your Security
Choice” on page 82.
Selecting a Funk Security Profile
You can define up to four profiles for Funk security. Different profiles
let your 70 Series communicate in different networks without having
to change all of your security settings. For example, you may want to
set up one profile for the manufacturing floor and one for the
warehouse. By default, the active profile is Profile 1.
Note: Your security choice does not depend on your authentication
server. For example, you can choose Funk security if you use Microsoft
Active Directory® to issue certificates.
Note: You can also use the Profile Wizard to configure most wireless
security settings. To start the Profile Wizard, tap the iConnect icon in
the lower right corner of the Today screen and select Tools > Wireless
Settings.