Intermec cn30 User Guide
Chapter 3 — Configuring the CN30
130
CN30 Mobile Computer User’s Manual
Wireless Network
Your wireless adapter (network interface card) connects to wireless networks
of two types: infrastructure networks and ad-hoc networks.
of two types: infrastructure networks and ad-hoc networks.
• Infrastructure networks get you onto your corporate network and the
internet. Your CN30 Computer establishes a wireless connection to an
access point, which links you to the rest of the network. When you con-
nect to a network via an access point, you are using the 802.11b/g infra-
structure mode.
access point, which links you to the rest of the network. When you con-
nect to a network via an access point, you are using the 802.11b/g infra-
structure mode.
• Ad-hoc networks are private networks shared between two or more cli-
ents, even with no access point.
Each wireless network is assigned a name (or Service Set Identifier - SSID)
to allow multiple networks to exist in the same area without infringement.
to allow multiple networks to exist in the same area without infringement.
Intermec Technologies recommends using security measures with wireless
networks to prevent unauthorized access to your network and to ensure
your privacy of transmitted data. Authentication (cryptographically pro-
tected) by both the network and the user and transmitted data are required
elements for secure networks. There are many schemes available for imple-
menting these features.
networks to prevent unauthorized access to your network and to ensure
your privacy of transmitted data. Authentication (cryptographically pro-
tected) by both the network and the user and transmitted data are required
elements for secure networks. There are many schemes available for imple-
menting these features.
Terminology
AES
(Advanced
Encryption
Standard)
(Advanced
Encryption
Standard)
A block cipher, a type of symmetric key cipher that uses groups of bits of a fixed length - called
blocks. A symmetric key cipher is a cipher that uses the same key for both encryption and
decryption.
blocks. A symmetric key cipher is a cipher that uses the same key for both encryption and
decryption.
CKIP (Cisco
Key Integrity
Protocol)
Key Integrity
Protocol)
This is Cisco's version of the TKIP protocol, compatible with Cisco Airnet products.
EAP
(Extensible
Authentication
Protocol)
(Extensible
Authentication
Protocol)
802.11b/g uses this protocol to perform authentication. This is not necessarily an authentication
mechanism, but is a common framework for transporting actual authentication protocols. Intermec
provides a number of EAP protocols for you to choose the best for your network.
mechanism, but is a common framework for transporting actual authentication protocols. Intermec
provides a number of EAP protocols for you to choose the best for your network.
EAP-FAST
(Flexible
Authentication
via Secure
Tunneling)
(Flexible
Authentication
via Secure
Tunneling)
A publicly accessible IEEE 802.1X EAP type developed by Cisco Systems. It is available as an IETF
informational draft. An 802.1X EAP type that does not require digital certificates, supports a variety
of user and password database types, supports password expiration and change, and is flexible, easy
to deploy, and easy to manage
informational draft. An 802.1X EAP type that does not require digital certificates, supports a variety
of user and password database types, supports password expiration and change, and is flexible, easy
to deploy, and easy to manage
TKIP
(Temporal Key
Integrity
Protocol)
(Temporal Key
Integrity
Protocol)
This protocol is part of the IEEE 802.11i encryption standard for wireless LANs., which provides
per-packet key mixing, a message integrity check and a re-keying mechanism, thus overcoming most
of the weak points of WEP. This encryption is more difficult to crack than the standard WEP. Weak
points of WEP include: No Installation Vector (IV) reuse protection, weak keys, no protection
against message replay, no detection of message tampering, and no key updates.
per-packet key mixing, a message integrity check and a re-keying mechanism, thus overcoming most
of the weak points of WEP. This encryption is more difficult to crack than the standard WEP. Weak
points of WEP include: No Installation Vector (IV) reuse protection, weak keys, no protection
against message replay, no detection of message tampering, and no key updates.
WEP (Wired
Equivalent
Privacy)
encryption
Equivalent
Privacy)
encryption
With preconfigured WEP, both the client CN30 Computer and access point are assigned the same
key, which can encrypt all data between the two devices. WEP keys also authenticate the CN30
Computer to the access point - unless the CN30 Computer can prove it knows the WEP key, it is
not allowed onto the network. WEP keys are only needed if they are expected by your clients. There
are two types available: 64-bit (5-character strings, 12345) (default) and 128-bit (13-character
strings, 1234567890123). Enter these as either ASCII (12345) or Hex (0x3132333435).
key, which can encrypt all data between the two devices. WEP keys also authenticate the CN30
Computer to the access point - unless the CN30 Computer can prove it knows the WEP key, it is
not allowed onto the network. WEP keys are only needed if they are expected by your clients. There
are two types available: 64-bit (5-character strings, 12345) (default) and 128-bit (13-character
strings, 1234567890123). Enter these as either ASCII (12345) or Hex (0x3132333435).