Intermec CK32 User Guide

Page of 149
Chapter 3 — Configuring the CK32 I-Safe
CK32 I-Safe Handheld Computer User’s Manual
61
If you are using WPA-802.1x, WPA2-802.1x, or 802.1x security, 
this section assumes that your authentication server and 
authenticators are properly configured.
Understanding the Wireless Network
Your wireless radio adapter (network interface card) connects to 
wireless networks of two types: infrastructure and ad-hoc 
networks.
• Infrastructure networks get you onto your corporate network 
and the internet. The CK32 I-Safe establishes a wireless 
connection to an access point, which links you to the rest of 
the network. When you connect to a network using an access 
point, you are using the 802.11 b/g infrastructure mode.
• Ad-hoc networks are private networks shared between two or 
more clients.
Each wireless network is assigned a name or SSID (Service Set 
Identifier) to allow multiple networks to exist in the same area 
without infringing on each other.
Intermec recommends using security with wireless networks to 
prevent unauthorized access to your network and to ensure the 
privacy of transmitted data. Authentication by both the network 
and the user are required elements for secure networks. Use the 
following table to understand some of the wireless network 
terminology.
Using WPA Security
Wi-Fi Protected Access (WPA) is a strongly enhanced, 
interoperable Wi-Fi security that addresses many of the 
vulnerabilities of Wired Equivalent Privacy (WEP). Instead of 
WEP, WPA uses Temporal Key Integrity Protocol (TKIP) for its 
data encryption method.
Currently, WPA satisfies some of the requirements in the IEEE 
802.11i draft standard. When the standard is finalized, WPA will 
maintain forward compatibility. 
Note: Your security choice does not depend on your 
authentication server. For example, you can choose Funk security 
if you use Microsoft’s Internet Authentication Service.