User's Manual
Table Of Contents
- Revision History
- Table of Contents
- About This Guide
- Chapter 1 Getting Started
- Chapter 2 Using the TC8000
- Chapter 3 Data Capture
- Introduction
- Status LED
- Laser Scanning
- Imaging
- Digital Camera
- Scanning Considerations
- Bar Code Capture with Laser Scanner
- Bar Code Capture with Imager
- Bar Code Capture with Camera
- Bar Code Capture with RS507 Hands-Free Imager
- Pairing the RS507 Hands-Free Imager Using SSI
- Pairing the RS507 Hands-Free Imager Using Bluetooth HID
- Hands Free Scanning
- Ergonomic Recommendations During Scanning
- DataWedge
- Pairing the RS507 Hands-Free Imager using HID
- Pairing the RS507 Hands-Fee Imager Using SSI
- Chapter 4 Wireless
- Chapter 5 Applications
- Chapter 6 Accessories
- Accessories
- 2-Slot Charge Only Cradle
- 5-Slot Charge Only Cradle
- 5-Slot Charge Only Cradle with Battery Charger
- 5-Slot Ethernet Cradle
- 5-Slot Ethernet Cradle with Battery Charger
- 4-Slot Battery Charger
- USB and Charging Cable
- Quick Disconnect Audio Adapter
- 3.5 mm Audio Adapter
- Desktop Stand
- Cart Mount
- Quick-Draw Soft Holster
- Presentation Holster
- Stylus
- Chapter 7 Maintenance and Troubleshooting
- Appendix A Specifications
- Index
CHAPTER 4 WIRELESS
Wireless Local Area Networks
Wireless local area networks (WLANs) allow the TC8000 to communicate wirelessly inside a building. Before using
the TC8000 on a WLAN, the facility must be set up with the required hardware to run the WLAN (sometimes known
as infrastructure). The infrastructure and the TC8000 must both be properly configured to enable this
communication.
Refer to the documentation provided with the infrastructure (access points (APs), access ports, switches, Radius
servers, etc.) for instructions on how to set up the infrastructure.
Once the infrastructure is set up to enforce the chosen WLAN security scheme, use the Wireless & networks
settings configure the TC8000 to match the security scheme.
The TC8000 supports the following WLAN security options:
•
Open
•
Wireless Equivalent Privacy (WEP).
•
Wi-Fi Protected Access (WPA/WPA2) Personal (PSK).
•
Extensible Authentication Protocol (EAP).
• Protected Extensible Authentication Protocol (PEAP) - with MSCHAPV2 and GTC authentication.
• Transport Layer Security (TLS)
• TTLS - with Password Authentication Protocol (PAP), MSCHAP and MSCHAPv2 authentication.
• LEAP
• EAP-FAST - with MSCHAPV2 and GTC authentication.
The Status bar displays icons that indicate Wi-Fi network availability and Wi-Fi status. See Status Bar on page 2-2
for more information.
NOTE
Turn off Wi-Fi when not using it, to extend the life of the battery.
Review Copy