User manual
Table Of Contents
- Contents
- About this Guide
- Getting Started
- Using the Device
- Settings
- Applications
- Data Capture
- Imaging
- Scanning Considerations
- Scanning with an Internal Scanner
- Scanning with the Camera
- Scanning with the RS507/RS507X Hands-Free Imager
- Scanning with the RS5100 Ring Scanner
- Scanning with the RS6000 Bluetooth Ring Scanner
- Scanning with the DS2278 Digital Scanner
- Scanning with the DS3678 Bluetooth Scanner
- Scanning with the DS8178 Digital Scanner
- Scanning with the LI3678 Linear Imager
- DataWedge
- Supported Decoders
- Camera Supported Decoders
- SE4100 Internal Imager Supported Decoders
- SE4710 Internal Imager Supported Decoders
- SE4720 Internal Imager Supported Decoders
- RS507/RS507x Supported Decoders
- RS5100 Supported Decoders
- RS6000 Supported Decoders
- DS2278 Supported Decoders
- DS3678 Supported Decoders
- DS8178 Supported Decoders
- LI3678 Supported Decoders
- Wireless
- Accessories
- Application Deployment
- Maintenance and Troubleshooting
- Technical Specifications
Wireless
5G NR FR1 LTE FDD/TDD WCDMA GSM
n77 B39
n78 B40
B41
B42
B43
B66
Table 24Rest of World and China(Continued)
Wireless Local Area Network
Wireless local area networks (WLANs) allow the device to communicate wirelessly inside a building. Before
using the device on a WLAN, the facility must be set up with the required hardware to run the WLAN
(sometimes known as infrastructure). The infrastructure and the device must both be properly configured to
enable this communication.
NOTE: To extend the life of the battery, turn off Wi-Fi when not in use.
Refer to the documentation provided with the infrastructure (access points (APs), access ports, switches,
Radius servers, etc.) for instructions on how to set up the infrastructure.
Once the infrastructure is set up to enforce the chosen WLAN security scheme, use the Wireless &
networks settings configure the device to match the security scheme.
The device supports the following WLAN security options:
• None
• Enhanced Open
• Wireless Equivalent Privacy (WEP)
• Wi-Fi Protected Access (WPA)/WPA2 Personal (PSK)
• WPA3-Personal
• WPA/WPA2/WPA3 Enterprise (EAP)
• Protected Extensible Authentication Protocol (PEAP) - with MSCHAPV2 and GTC authentication.
• Transport Layer Security (TLS)
• Tunneled Transport Layer Security (TTLS) - with Password Authentication Protocol (PAP), MSCHAP
and MSCHAPv2 authentication.
• Password (PWD).
• Extensible Authentication Protocol Method for Subscriber Identity Module (SIM)
• Extensible Authentication Protocol Method for Authentication and Key Agreement (AKA)
• Improved Extensible Authentication Protocol Method for Authentication and Key Agreement (AKA')
• Lightweight Extensible Authentication Protocol (LEAP).
• WPA3-Enterprise 192-bit
90