Contents
CN2A Mobile Computer User’s Manual
vii
Configuring the Network Parameters for a TCP/IP Network . . . 46
Configuring the Network Parameters for a UDP Plus Network . . 48
Configuring Network Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Choosing Between Funk Security and Microsoft Security Software. . . . . . . 50
Selecting and Defining Profiles for Funk Security . . . . . . . . . . . . 50
Choosing Microsoft Security Software . . . . . . . . . . . . . . . . . . . . . 51
Using WPA Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Configuring WPA Security With Funk Security . . . . . . . . . . . . . 53
Configuring WPA Security With Microsoft Security . . . . . . . . . . 55
Using 802.1x Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Configuring 802.1x Security With Funk Security . . . . . . . . . . . . 58
Configuring 802.1x Security With Microsoft Security . . . . . . . . 60
Using LEAP Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Using Static WEP Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Configuring Static WEP Security With Funk Security . . . . . . . . 63
Configuring Static WEP Security With Microsoft Security . . . . . 64
Loading Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Disabling Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Viewing Wireless Network Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Using Remote Desktop Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Transferring Files With FTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Enabling the FTP Server on the CN2A . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Changing the Default FTP User Name and Password. . . . . . . . . . . . . . . . . 73
Updating Your Access Control List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Using FTP to Transfer Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Using the Modem Dock for Internet Access and E-mail . . . . . . . . . . . . . . . . . . . . . . 75
Connecting to the Internet Through the Modem Dock . . . . . . . . . . . . . . . 75
Setting Up an E-mail Account Through the Modem Dock. . . . . . . . . . . . . 82
4
Developing and Installing Applications
. . . . . . . . . . . . . . . . . . . 85
Developing Applications for the CN2A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Developing a New Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Understanding the Resource Kits and Platform SDKs . . . . . . . . . 86
Downloading the Resource Kits and CN2A Platform SDK . . . . . 87
Understanding the Hardware and Software Requirements . . . . . . 87
Developing a Web-Based Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Installing Applications on the CN2A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Installing Applications Using ActiveSync . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Summary of Contents for CN2A
Page 1: ...User s Manual CN2A Mobile Computer ...
Page 4: ...iv CN2A Mobile Computer User s Manual ...
Page 10: ...Contents x CN2A Mobile Computer User s Manual ...
Page 16: ...Before You Begin xvi CN2A Mobile Computer User s Manual ...
Page 112: ...Chapter 4 Developing and Installing Applications 96 CN2A Mobile Computer User s Manual ...
Page 148: ...Appendix A Specifications and Accessories 132 CN2A Mobile Computer User s Manual ...
Page 161: ...CN2A Mobile Computer User s Manual 145 I Index ...
Page 173: ......