User's Manual
Table Of Contents
- Before You Begin
- Chapter 1 - Using the CV30 Fixed Mount Computer
- Chapter 2 - Understanding Windows CE
- Chapter 3 - Configuring the CV30
- Configuring the CV30 Operating Parameters
- Setting Up Ethernet Communications
- Setting Up Bluetooth Communications
- Setting Up 802.11 Radio Communications
- Configuring Security on the CV30
- Understanding the Wireless Network
- Using WPA Security
- Using Static WEP Security
- Using 802.1x Security
- Using LEAP Security
- Choosing Between Funk and Microsoft Security
- Configuring Funk Security Using Intermec Settings
- Configuring Funk Security Using the Profile Wizard
- Configuring WEP Security With Profile Wizard
- Configuring WPA-PSK Security With Profile Wizard
- Configuring WPA2-PSK Security With Profile Wizard
- Configuring PEAP Security With Profile Wizard
- Configuring TLS Security With Profile Wizard
- Configuring TTLS Security With Profile Wizard
- Configuring LEAP Security With Profile Wizard
- Configuring EAP-FAST with Profile Wizard
- Configuring Microsoft Security
- Loading a Certificate
- Disabling Security
- Chapter 4 - Developing and InstallingApplications
- Chapter 5 - Troubleshooting andMaintaining the CV30
- Appendix - Specifications
- Index
Chapter 3 — Configuring the CV30
42 CV30 Fixed Mount Computer With Windows CE User’s Manual
WPA2 runs in 802.1x (Enterprise) mode or PSK (Pre-Shared
Key) mode:
• For WPA2-802.1x mode, WPA2 requires authentication in
two phases; the first is an open system authentication and the
second uses 802.1x and an Extensible Authentication
Protocol (EAP) authentication method.
• In PSK mode, WPA2 provides user authentication using a
shared key between the authenticator and the CV30. WPA2-
PSK is a good solution for small offices or home offices that
do not want to use an authentication server.
Using Static WEP Security
The CV30 uses the Wired Equivalent Privacy (WEP) protocol to
add security to your wireless network based on the 802.11
standard.
To use WEP security, you need:
• a CV30 with an 802.11b/g radio.
• an access point with an 802.11b/g radio.
Using 802.1x Security
802.1x security provides centralized user authentication using an
authentication server, authenticators (access points), and
supplicants (wireless devices). These components communicate
using an EAP authentication type, such as TLS (Transport Layer
Security) or PEAP (Protected Extensible Authentication
Protocol). 802.1x security provides data encryption using
dynamic key management.
To use 802.1x security, you need:
• an access point with an 802.11b/g radio.
• a CV30 with an 802.11b/g radio.
• an authentication server.