Intermec CK32 User Guide
Chapter 3 — Configuring the CK32 I-Safe
CK32 I-Safe Handheld Computer User’s Manual
61
If you are using WPA-802.1x, WPA2-802.1x, or 802.1x security,
this section assumes that your authentication server and
authenticators are properly configured.
this section assumes that your authentication server and
authenticators are properly configured.
Understanding the Wireless Network
Your wireless radio adapter (network interface card) connects to
wireless networks of two types: infrastructure and ad-hoc
networks.
wireless networks of two types: infrastructure and ad-hoc
networks.
• Infrastructure networks get you onto your corporate network
and the internet. The CK32 I-Safe establishes a wireless
connection to an access point, which links you to the rest of
the network. When you connect to a network using an access
point, you are using the 802.11 b/g infrastructure mode.
connection to an access point, which links you to the rest of
the network. When you connect to a network using an access
point, you are using the 802.11 b/g infrastructure mode.
• Ad-hoc networks are private networks shared between two or
more clients.
Each wireless network is assigned a name or SSID (Service Set
Identifier) to allow multiple networks to exist in the same area
without infringing on each other.
Identifier) to allow multiple networks to exist in the same area
without infringing on each other.
Intermec recommends using security with wireless networks to
prevent unauthorized access to your network and to ensure the
privacy of transmitted data. Authentication by both the network
and the user are required elements for secure networks. Use the
following table to understand some of the wireless network
terminology.
prevent unauthorized access to your network and to ensure the
privacy of transmitted data. Authentication by both the network
and the user are required elements for secure networks. Use the
following table to understand some of the wireless network
terminology.
Using WPA Security
Wi-Fi Protected Access (WPA) is a strongly enhanced,
interoperable Wi-Fi security that addresses many of the
vulnerabilities of Wired Equivalent Privacy (WEP). Instead of
WEP, WPA uses Temporal Key Integrity Protocol (TKIP) for its
data encryption method.
interoperable Wi-Fi security that addresses many of the
vulnerabilities of Wired Equivalent Privacy (WEP). Instead of
WEP, WPA uses Temporal Key Integrity Protocol (TKIP) for its
data encryption method.
Currently, WPA satisfies some of the requirements in the IEEE
802.11i draft standard. When the standard is finalized, WPA will
maintain forward compatibility.
802.11i draft standard. When the standard is finalized, WPA will
maintain forward compatibility.
Note: Your security choice does not depend on your
authentication server. For example, you can choose Funk security
if you use Microsoft’s Internet Authentication Service.
authentication server. For example, you can choose Funk security
if you use Microsoft’s Internet Authentication Service.