Intermec cn30 User Guide

Page of 196
Chapter 3 — Configuring the CN30
130
CN30 Mobile Computer User’s Manual
Wireless Network
Your wireless adapter (network interface card) connects to wireless networks 
of two types: infrastructure networks and ad-hoc networks.
• Infrastructure networks get you onto your corporate network and the 
internet. Your CN30 Computer establishes a wireless connection to an 
access point, which links you to the rest of the network. When you con-
nect to a network via an access point, you are using the 802.11b/g infra-
structure mode.
• Ad-hoc networks are private networks shared between two or more cli-
ents, even with no access point.
Each wireless network is assigned a name (or Service Set Identifier - SSID) 
to allow multiple networks to exist in the same area without infringement.
Intermec Technologies recommends using security measures with wireless 
networks to prevent unauthorized access to your network and to ensure 
your privacy of transmitted data. Authentication (cryptographically pro-
tected) by both the network and the user and transmitted data are required 
elements for secure networks. There are many schemes available for imple-
menting these features.
Terminology
AES 
(Advanced 
Encryption 
Standard)
A block cipher, a type of symmetric key cipher that uses groups of bits of a fixed length - called 
blocks. A symmetric key cipher is a cipher that uses the same key for both encryption and 
decryption.
CKIP (Cisco 
Key Integrity 
Protocol)
This is Cisco's version of the TKIP protocol, compatible with Cisco Airnet products.
EAP 
(Extensible 
Authentication 
Protocol)
802.11b/g uses this protocol to perform authentication. This is not necessarily an authentication 
mechanism, but is a common framework for transporting actual authentication protocols. Intermec 
provides a number of EAP protocols for you to choose the best for your network.
EAP-FAST 
(Flexible 
Authentication 
via Secure 
Tunneling)
A publicly accessible IEEE 802.1X EAP type developed by Cisco Systems. It is available as an IETF 
informational draft. An 802.1X EAP type that does not require digital certificates, supports a variety 
of user and password database types, supports password expiration and change, and is flexible, easy 
to deploy, and easy to manage
TKIP 
(Temporal Key 
Integrity 
Protocol)
This protocol is part of the IEEE 802.11i encryption standard for wireless LANs., which provides 
per-packet key mixing, a message integrity check and a re-keying mechanism, thus overcoming most 
of the weak points of WEP. This encryption is more difficult to crack than the standard WEP. Weak 
points of WEP include: No Installation Vector (IV) reuse protection, weak keys, no protection 
against message replay, no detection of message tampering, and no key updates.
WEP (Wired 
Equivalent 
Privacy) 
encryption
With preconfigured WEP, both the client CN30 Computer and access point are assigned the same 
key, which can encrypt all data between the two devices. WEP keys also authenticate the CN30 
Computer to the access point - unless the CN30 Computer can prove it knows the WEP key, it is 
not allowed onto the network. WEP keys are only needed if they are expected by your clients. There 
are two types available: 64-bit (5-character strings, 12345) (default) and 128-bit (13-character 
strings, 1234567890123). Enter these as either ASCII (12345) or Hex (0x3132333435).