Specifications
Table Of Contents
- MC3000
- Revision History
- Contents
- About This Guide
- Getting Started
- Introduction
- Unpacking the Mobile Computer
- Accessories
- Parts
- Mobile Computer Startup
- Battery Charging
- Spare Battery Charging
- Stylus
- Starting the Mobile Computer
- Resetting the Mobile Computer
- Waking the Mobile Computer
- Main Battery Removal
- Strap/Door Assembly Removal and Replacement
- Strap/Door Assembly Removal and Replacement (MC3090-G)
- File System Directory Structure
- Flash Storage
- Launching Applications
- Accessories
- ActiveSync
- Software Installation on Development PC
- Software Installation on Mobile Computer
- Creating/Loading Hex Images
- Wireless Applications
- AirBEAM Smart
- Rapid Deployment Client
- Maintenance & Troubleshooting
- Technical Specifications
- Glossary
- Index
- Tell Us What You Think...

Wireless Applications 7-7
Ad-Hoc
Use the Ad-Hoc dialog box to select the necessary information to control Ad-Hoc mode. This dialog box does not display if
Infrastructure mode is selected. To Select Ad-Hoc mode:
1. Select a channel number from the Channel drop-down list. The default is Channel 1 (2412 MHz).
Figure 7-5. Ad-Hoc Settings Dialog Box
2. Tap Next. The Authentication dialog box displays.
Authentication
Use the Authentication dialog box to configure authentication. If Ad-Hoc mode is selected, the user can only select None because
Ad-Hoc authentication is not supported. Table 7-6 lists the available authentication options.
Figure 7-6. Authentication Dialog Box
Select an authentication type from the drop-down list and tap Next. If PEAP or TTLS is selected, the Tunneled dialog box displays. If
None, EAP TLS or LEAP is selected the Encryption dialog box displays. See Encryption on page 7-16 for encryption options.
Table 7-6. Authentication Options
Authentication Description
None Default setting when authentication is not required on the network.
EAP TLS Select this option to enable EAP TLS authentication. EAP TLS is an authentication scheme through IEEE 802.1x. It
authenticates users and ensures only valid users can connect to the network. It also restricts unauthorized users from
accessing transmitted information. EAP TLS achieves this through secure authentication certificates.
PEAP Select this option to enable PEAP authentication. This method uses a digital certificate to verify and authenticate a user's
identity.
LEAP Select this option to enable LEAP authentication. LEAP is founded on mutual authentication. The AP and the mobile computer
attempting to connect to it require authentication before access to the network is permitted.
TTLS Select this option to enable TTLS authentication.