Configuring The Unit Using Wireless Zero Config - Motorola 7528X User Manual

Windows embedded hand-held 6.5
Table of Contents

Advertisement

C - 4 Workabout Pro4 (Windows Embedded Hand-Held 6.5) User Manual

Configuring the Unit Using Wireless Zero Config

In the Wi-Fi screen, tap on Add New....
Type the appropriate SSID (Service Set Identifier) in the Network name: dialog box. The Network name
field can contain a maximum of 32 characters.
Choose the type of connection in the drop-down menu next to Connects to.
Tap on Next.
In the Configure Network Authentication screen, choose the appropriate Authentication, Data Encryp-
tion, Network key and Key index for your network. These are outlined below. Keep in mind that these
options vary depending on the type of Authentication chosen.
Authentication: Several subtypes of network authentication services are supported: Open, Shared, WPA,
and WPA-PSK, WPA2 and WPA2-PSK.
Open authentication does not provide security. When this option is chosen, the hand-held connects to
wireless networks which do not use authentication or encryption.
Under Shared authentication, each wireless station is assumed to have received a secret shared key over
a secure channel that is independent from the 802.11 wireless network communications channel.
Under WPA and WPA-PSK authentication, the use of 802.1x authentication is required. For wireless net-
works without a Remote Authentication Dial-In User Service (RADIUS) infrastructure, WPA supports the
use of a preshared key. For wireless networks with a RADIUS infrastructure, Extensible Authentication
Protocol (EAP) and RADIUS is supported.
Encryption: WEP (Wired-Equivalent Privacy) encryption prevents others from accidentally accessing your
network. If you are not using encryption, you can choose Disabled from the drop-down encryption menu.
Otherwise, leave this field as is.
AES (Advanced Encryption Standard) is a standard for protecting data through encryption. AES supports
key sizes of 128 bits, 192 bits and 256 bits and will serve as a replacement for the Data Encryption Stand-
ard (DES). In addition to the increased security that comes with larger key sizes, the AES algorithm is a
symmetrical block cipher that can encrypt (encipher) and decrypt (decipher) information.
TKIP (Temporal Key Integrity Protocol) uses the original WEP programming but wraps additional code at
the beginning and end to encapsulate and modify it. Like WEP, TKIP uses the RC4 stream encryption algo-
rithm as its basis. The new protocol, however, encrypts each data packet with a unique encryption key, and
the keys are much stronger than those of its predecessor.
Network Key: This field becomes available if you deselect The key is automatically provided. This text box
is used to specify a 5 or 13 ASCII character sequence or an equivalent 10 or 26 Hexadecimal digit
sequence that matches the active WEP key on the access point. It is set to automatically provide a key
by default.
Draft #6

Advertisement

Table of Contents
loading

This manual is also suitable for:

Workabout pro47528xp

Table of Contents