Intermec CS40 CS40 Mobile Computer User's Manual - Page 83
How to Choose Between Microsoft and Funk Security, About Funk Security
View all Intermec CS40 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 83 highlights
Chapter 7 - Configuring the Computer You need to use either Funk or Microsoft security to implement your security solution. For details, see the next section, "How to Choose Between Microsoft and Funk Security" on page 71. If you are using WPA-802.1x, WPA2-802.1x, or 802.1x security, make sure that your authentication server and authenticators are properly configured. Note: Your security choice does not depend on your authentication server. For example, you can choose Funk security if you use Microsoft Active Directory® to issue certificates. How to Choose Between Microsoft and Funk Security The computer supports both Funk and Microsoft security, which dynamically selects wireless networks based on your preferences. The option you choose depends on your network security needs: • If you are using the computer in a static environment that requires a high level of security, you should use Funk security, which offers CCX v4.0 compliance, support for LEAP and TTLS, and configuration for up to four profiles. To use Funk security, you need to select a profile. For help, see the next section. • If you are primarily using the mobile computer to connect to Wi-Fi hotspots, you may want to use Microsoft security. To use Microsoft security, you need to select it as your security choice. For help, see "About Microsoft Security" on page 76. About Funk Security You can define up to four profiles for Funk security. Different profiles let your mobile computer communicate in different networks without having to change security settings. For example, you may want to set up one profile for the manufacturing floor and one for the warehouse. By default, the active profile is Profile 1. CS40 Mobile Computer User's Manual 71