LXE mx7 Verweisanleitung
E-EQ-MX7RG-H
MX7 Reference Guide
Chapter 5 Wireless Network Configuration
Introduction
The MX7 mobile device uses the LXE 802.11network card and either the Funk® Odyssey Client
software on the mobile device or the Summit Client software. Both client software utilities
support WEP encryption, WPA security, no authentication and all authentications listed below.
software on the mobile device or the Summit Client software. Both client software utilities
support WEP encryption, WPA security, no authentication and all authentications listed below.
The Summit client device is either an 802.11g radio, capable of both 802.11b and 802.11g data
rates or an 802.11a radio, capable of 802.11a, 802.11b and 802.11g data rates.
rates or an 802.11a radio, capable of 802.11a, 802.11b and 802.11g data rates.
The Odyssey Client device is an 802.11b/g network card, capable of both 802.11b and 802.11g
data rates.
data rates.
This chapter is separated into two sections: Funk Odyssey Client Configuration and Summit
Client Configuration. Please refer to the table below for the security options supported by each
client.
Client Configuration. Please refer to the table below for the security options supported by each
client.
Security Options
Supported
Summit Client
(CE .NET 4.2 - 802.11b/g)
(CE 5 - 802.11a / 802.11g)
Odyssey Client
(CE .NET 4.2 - 802.11b/g)
No Security
Yes
Yes
WEP Yes Yes
LEAP Yes Yes
EAP-FAST Yes
No
PEAP-MSCHAP Yes
Yes
WPA/LEAP Yes
Yes
WPA-PSK Yes
Yes
PEAP-GTC Yes
Yes
EAP-TLS Yes
Yes
Prerequisites
•
Network SSID or ESSID number of the Access Point
•
WEP or LEAP Authentication Protocol Keys
•
The Summit profile settings for Auth Type, EAP Type and Encryption depend on the
security option chosen.
security option chosen.
Please refer to the LXE Security Primer” to prepare the Authentication Server and Access Point
for MX7 communication.
for MX7 communication.
It is important that all dates are correct on CE computers when using any type of certificate.
Certificates are date sensitive and if the date is not correct authentication will fail.
Certificates are date sensitive and if the date is not correct authentication will fail.
Certificates are necessary for many of the WPA authentications. Please refer to the Root
Certificates and User Certificates sections at the end of this chapter for more information on
generating and installing certificates.
Certificates and User Certificates sections at the end of this chapter for more information on
generating and installing certificates.