Manually Adding a Wi-Fi Network
Manually add a Wi-Fi network if the network does not broadcast its name (SSID) or to add a Wi-Fi network when out
of range.
Procedure:
1
Touch
.
2
Touch
Wi-Fi
.
3
Slide the Wi-Fi switch to the
On
position.
4
Touch
+
at the bottom of the screen.
5
In the
Network SSID
text box, enter the name of the Wi-Fi network.
6
In the
Security
drop-down list, select the type of security. Options:
•
None
•
WEP
•
WPA/WPA2 PSK
•
802.1x EAP
.
7
If the network security is
None
, touch
Save
.
8
If the network security is
WEP
or
WPA/WPA2 PSK
, enter the required password and then touch
Save
.
9
If the network security is
802.1x EAP
:
• Touch the
EAP method
drop-down list and select
PEAP
,
TLS
,
PWD
,
TTLS
,
LEAP
or
FAST
.
• Touch the
Phase 2 authentication
drop-down list and select an authentication method.
• If required, touch
CA certificate
and select a Certification Authority (CA) certificate. Note: Certificates are
installed using the
Security
settings.
• If required, touch
User certificate
and select a user certificate. Note: User certificates are installed using the
Security
settings.
• If required, in the
Identity
text box, enter the username credentials.
• If desired, in the
Anonymous
identity text box, enter an anonymous identity username.
• If required, in the
Password
text box, enter the password for then given identity.
10
Note:
By default, the network Proxy is set to
None
and the IP settings is set to
DHCP
for a Proxy Server on page 103
for setting connection to a proxy server and see
to Use a Static IP Address on page 104
for setting the device to use a static IP address.
Touch
Save
. To connect to the saved network, touch and hold on the saved network and select
Connect to
network
.
11
Touch
.
Configuring for a Proxy Server
A proxy server is a server that acts as an intermediary for requests from clients seeking resources from other servers.
A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource,
available from a different server. The proxy server evaluates the request according to its filtering rules. For example,
it may filter traffic by IP address or protocol. If the request is validated by the filter, the proxy provides the resource
by connecting to the relevant server and requesting the service on behalf of the client.
It is important for enterprise customers to be able to set up secure computing environments within their companies,
and proxy configuration is an essential part of doing that. Proxy configuration acts as a security barrier ensuring that
the proxy server monitors all traffic between the Internet and the intranet. This is normally an integral part of security
enforcement in corporate firewalls within intranets.
Procedure:
1
In the network dialog box, touch a network.
Wireless |
103
Summary of Contents for Symbol TC70
Page 1: ...TC70 USER GUIDE ...
Page 2: ......
Page 4: ......
Page 6: ......
Page 12: ...12 Contents ...
Page 16: ......
Page 36: ...Figure 26 Wake Up Sources Dialog Box 4 Touch 36 Getting Started ...
Page 52: ...Figure 35 Lock Screen Figure 36 PIN Screen 52 Using the TC70 ...
Page 53: ...Figure 37 Pattern Screen Using the TC70 53 ...
Page 57: ...Figure 41 Lock Screen Using the TC70 57 ...
Page 58: ......
Page 90: ...8 Touch or 9 Touch Enable Elemez 90 Applications ...
Page 98: ......
Page 154: ...Figure 149 Rotate Device onto Trigger Handle 154 Accessories ...
Page 164: ......
Page 165: ......