Intermec CS40 CS40 Mobile Computer User's Manual - Page 83

How to Choose Between Microsoft and Funk Security, About Funk Security

Page 83 highlights

Chapter 7 - Configuring the Computer You need to use either Funk or Microsoft security to implement your security solution. For details, see the next section, "How to Choose Between Microsoft and Funk Security" on page 71. If you are using WPA-802.1x, WPA2-802.1x, or 802.1x security, make sure that your authentication server and authenticators are properly configured. Note: Your security choice does not depend on your authentication server. For example, you can choose Funk security if you use Microsoft Active Directory® to issue certificates. How to Choose Between Microsoft and Funk Security The computer supports both Funk and Microsoft security, which dynamically selects wireless networks based on your preferences. The option you choose depends on your network security needs: • If you are using the computer in a static environment that requires a high level of security, you should use Funk security, which offers CCX v4.0 compliance, support for LEAP and TTLS, and configuration for up to four profiles. To use Funk security, you need to select a profile. For help, see the next section. • If you are primarily using the mobile computer to connect to Wi-Fi hotspots, you may want to use Microsoft security. To use Microsoft security, you need to select it as your security choice. For help, see "About Microsoft Security" on page 76. About Funk Security You can define up to four profiles for Funk security. Different profiles let your mobile computer communicate in different networks without having to change security settings. For example, you may want to set up one profile for the manufacturing floor and one for the warehouse. By default, the active profile is Profile 1. CS40 Mobile Computer User's Manual 71

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152

Chapter 7 — Configuring the Computer
CS40 Mobile Computer User’s Manual
71
You need to use either Funk or Microsoft security to implement your
security solution. For details, see the next section,
“How to Choose
Between Microsoft and Funk Security” on page 71
.
If you are using WPA-802.1x, WPA2-802.1x, or 802.1x security, make
sure that your authentication server and authenticators are properly
configured.
How to Choose Between Microsoft and Funk Security
The computer supports both Funk and Microsoft security, which
dynamically selects wireless networks based on your preferences. The
option you choose depends on your network security needs:
If you are using the computer in a static environment that requires
a high level of security, you should use Funk security, which offers
CCX v4.0 compliance, support for LEAP and TTLS, and
configuration for up to four profiles.
To use Funk security, you need to select a profile. For help, see the
next section.
If you are primarily using the mobile computer to connect to Wi-Fi
hotspots, you may want to use Microsoft security.
To use Microsoft security, you need to select it as your security
choice. For help, see
“About Microsoft Security” on page 76
.
About Funk Security
You can define up to four profiles for Funk security. Different profiles
let your mobile computer communicate in different networks without
having to change security settings. For example, you may want to set
up one profile for the manufacturing floor and one for the warehouse.
By default, the active profile is Profile 1.
Note:
Your security choice does not depend on your authentication
server. For example, you can choose Funk security if you use Microsoft
Active Directory® to issue certificates.