Wasp Bar Code WDT3250 RF Manual De Usuario

Descargar
Página de 9
Wasp Technologies -  WDT3250 RF Setup Guide 
 
  
4
 
-  Delete: Delete the profile, provided that it is not the active profile. 
-  Scan: Open a window that lists access points that are broadcasting their SSIDs. Each time you 
tap the Refresh button, you view an updated list of APs, with each row showing an AP’s SSID, its 
received signal strength indication (RSSI), and whether or not data encryption is in use (true or 
false).  You can sort the list by clicking on the column headers.  If you are authorized as an 
administrator, you can create a profile for one of the listed SSIDs by highlighting it and tapping 
Commit.  You will be returned to the Profile window where you can create a profile for that SSID. 
•  Radio: Radio attributes in the list box can be selected individually.  When an attribute is selected, the 
current setting or an appropriate selection box with the current setting highlighted appears on the 
right side of the screen. 
•  Security: Values for the two primary security attributes, EAP type and encryption type, are displayed 
in separate dropdown lists, with the current values highlighted.  When you as an administrator select 
an EAP type, the Credentials button appears.  When you tap Credentials, a dialog box appears that 
enables you to define authentication credentials for that EAP type.  When you as an administrator 
select an encryption type that requires the definition of WEP keys or a pre-shared key, the PSKs/WEP 
Keys
 button appears.  When you tap this button, a dialog box appears that enables you to define WEP 
keys or a PSK. 
•  Commit: To ensure that changes to profile settings made on the window are saved in the profile, you 
must tap the Commit button. 
•  Scan: To view available wireless networks 
 
To cause a Summit radio to connect to a typical business WLAN, you must select a profile that specifies 
the SSID, EAP type, and encryption type supported by the WLAN: 
•  SSID: This is the name or identification of the WLAN. 
 
•  EAP type: This is the protocol used to authenticate the device and its user if the WLAN uses the 
Enterprise version of Wi-Fi Protected Access (WPA) and WPA2.  SCU supports five EAP types: 
PEAP with EAP-MSCHAP (PEAP-MSCHAP), PEAP with EAP-GTC (PEAP-GTC), EAP-TLS, 
LEAP, and EAP-FAST 
•  Encryption: This specifies the type of key used to encrypt and decrypt transmitted data and how that 
key is specified or derived.  Encryption options include: 
-  WPA2 or WPA with dynamic keys (derived from the EAP authentication process) 
-  WPA2 or WPA with pre-shared keys 
-  Static WEP keys