User's Manual
Chapter 3 — Configuring the CK60 Computer
64 CK60 Series Handheld Computer User’s Manual
Configuring Security
Use the next sections to understand how to configure each type of security
on your wireless CK60 Computer. If you choose not to use security, see
“Using Configuration Parameters” on page 90 for help.
If you are using 802.1x security, this sections also assumes that your
authentication server and access points are properly configured.
Loading Certificates
If you choose to use Transport Layer Security (TLS) with WPA or 802.1x
security, you need to have a unique client certificate on the CK60 Com-
puter and a trusted root certificate authority (CA) certificate. If you choose
to use PEAP, you need to load a root CA certificate. You can use a third-
party CA to issue unique client certificates and a root certificate.
Wireless Network
Your wireless adapter (network interface card) connects to wireless net-
works of two types: infrastructure networks and ad-hoc networks.
• Infrastructure networks get you onto your corporate network and the
internet. Your CK60 Computer establishes a wireless connection to an
access point, which links you to the rest of the network. When you con-
nect to a network via an access point, you are using the 802.11b/g infra-
structure mode.
• Ad-hoc networks are private networks shared between two or more cli-
ents, even with no access point.
Each wireless network is assigned a name (or Service Set Identifier - SSID)
to allow multiple networks to exist in the same area without infringement.
If your CA is on your WLAN, select Start > Settings > Control Panel, then
double-tap the Certificates icon to access the Certificate control panel
applet and obtain the certificates.
Note: Do not perform a cold-boot on the CK60 Computer. This resets the
time and date.