C - 4
Workabout Pro4 (Windows Embedded Hand-Held 6.5) User Manual
Configuring the Unit Using Wireless Zero Config
•
In the
Wi-Fi
screen, tap on
Add New...
.
•
Type the appropriate
SSID
(Service Set Identifier) in the
Network name:
dialog box. The
Network name
field can contain a maximum of 32 characters.
•
Choose the type of connection in the drop-down menu next to
Connects to
.
•
Tap on
Next
.
•
In the Configure Network Authentication screen, choose the appropriate
Authentication
,
Data Encryp-
tion
,
Network key
and
Key index
for your network. These are outlined below. Keep in mind that these
options vary depending on the type of
Authentication
chosen.
•
Authentication
: Several subtypes of network authentication services are supported: Open, Shared, WPA,
and WPA-PSK, WPA2 and WPA2-PSK.
•
Open
authentication does not provide security. When this option is chosen, the hand-held connects to
wireless networks which do not use authentication or encryption.
•
Under
Shared
authentication, each wireless station is assumed to have received a secret shared key over
a secure channel that is independent from the 802.11 wireless network communications channel.
•
Under
WPA and WPA-PSK
authentication, the use of 802.1x authentication is required. For wireless net-
works without a Remote Authentication Dial-In User Service (RADIUS) infrastructure, WPA supports the
use of a preshared key. For wireless networks with a RADIUS infrastructure, Extensible Authentication
Protocol (EAP) and RADIUS is supported.
•
Encryption
:
WEP
(Wired-Equivalent Privacy) encryption prevents others from accidentally accessing your
network. If you are not using encryption, you can choose
Disabled
from the drop-down encryption menu.
Otherwise, leave this field as is.
•
AES
(Advanced Encryption Standard) is a standard for protecting data through encryption. AES supports
key sizes of 128 bits, 192 bits and 256 bits and will serve as a replacement for the Data Encryption Stand-
ard (DES). In addition to the increased security that comes with larger key sizes, the AES algorithm is a
symmetrical block cipher that can encrypt (encipher) and decrypt (decipher) information.
•
TKIP
(Temporal Key Integrity Protocol) uses the original WEP programming but wraps additional code at
the beginning and end to encapsulate and modify it. Like WEP, TKIP uses the RC4 stream encryption algo-
rithm as its basis. The new protocol, however, encrypts each data packet with a unique encryption key, and
the keys are much stronger than those of its predecessor.
•
Network Key
: This field becomes available if you deselect
The key is automatically provided
. This text box
is used to specify a 5 or 13 ASCII character sequence or an equivalent 10 or 26 Hexadecimal digit
sequence that matches the active WEP key on the access point. It is set to automatically provide a key
by default.
Draft #6
Summary of Contents for 7528X
Page 1: ...WORKABOUT PRO4 HAND HELD COMPUTER Windows Embedded Hand Held 6 5 USER GUIDE Draft 6 ...
Page 2: ...Draft 6 ...
Page 3: ...i WORKABOUT PRO4 HAND HELD COMPUTER USER GUIDE 8000295 A January 23 2014 Draft 6 ...
Page 14: ...Draft 6 ...
Page 16: ...Draft 6 ...
Page 20: ...Draft 6 ...
Page 22: ...Draft 6 ...
Page 38: ...2 12 Workabout Pro4 Windows Embedded Hand Held 6 5 User Manual Draft 6 ...
Page 98: ...Draft 6 ...
Page 171: ...Settings 4 77 Draft 6 ...
Page 172: ...4 78 Workabout Pro4 Windows Embedded Hand Held 6 5 User Manual Draft 6 ...
Page 173: ...Settings 4 79 Draft 6 ...
Page 174: ...4 80 Workabout Pro4 Windows Embedded Hand Held 6 5 User Manual Draft 6 ...
Page 175: ...Settings 4 81 Draft 6 ...
Page 176: ...4 82 Workabout Pro4 Windows Embedded Hand Held 6 5 User Manual Draft 6 ...
Page 178: ...Draft 6 ...
Page 186: ...Draft 6 ...
Page 190: ...Draft 6 ...
Page 196: ...Draft 6 ...
Page 198: ...Draft 6 ...
Page 202: ...C 6 Workabout Pro4 Windows Embedded Hand Held 6 5 User Manual Draft 6 ...
Page 209: ...Draft 6 ...