Intermec CV30 CV30 Fixed Mount Computer User's Manual - Page 52

Using WPA Security, WEP, WPA uses Temporal Key Integrity Protocol TKIP for its

Page 52 highlights

Chapter 3 - Configuring the CV30 Each wireless network is assigned a name or SSID (Service Set Identifier) to allow multiple networks to exist in the same area without infringing on each other. Intermec recommends using security with wireless networks to prevent unauthorized access to your network and to ensure the privacy of transmitted data. Authentication by both the network and the user are required elements for secure networks. Use the following table to understand some of the wireless network terminology. Using WPA Security Wi-Fi Protected Access (WPA) is a strongly enhanced, interoperable Wi-Fi security that addresses many of the vulnerabilities of Wired Equivalent Privacy (WEP). Instead of WEP, WPA uses Temporal Key Integrity Protocol (TKIP) for its data encryption method. Currently, WPA satisfies some of the requirements in the IEEE 802.11i draft standard. When the standard is finalized, WPA will maintain forward compatibility. WPA runs in 802.1x (Enterprise) mode or PSK (Pre-Shared Key) mode: • In Enterprise mode, WPA provides user authentication using 802.1x and the Extensible Authentication Protocol (EAP). That is, an authentication server (such as a RADIUS server) must authenticate each device before the device can communicate with the wireless network. • In PSK mode, WPA provides user authentication using a shared key between the authenticator and the CV30. WPAPSK is a good solution for small offices or home offices that do not want to use an authentication server. To use WPA security, you need: • an authentication server (Enterprise mode only). Note: You can also use a MobileLAN access point with software release 1.80 or later as an authentication server. For help, see the system manual for your access point. • an access point with an 802.11 b/g radio that supports WPA. 42 CV30 Fixed Mount Computer User's Manual

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100

Chapter 3 — Configuring the CV30
42
CV30 Fixed Mount Computer User’s Manual
Each wireless network is assigned a name or SSID (Service Set
Identifier) to allow multiple networks to exist in the same area
without infringing on each other.
Intermec recommends using security with wireless networks to
prevent unauthorized access to your network and to ensure the
privacy of transmitted data. Authentication by both the network
and the user are required elements for secure networks. Use the
following table to understand some of the wireless network
terminology.
Using WPA Security
Wi-Fi Protected Access (WPA) is a strongly enhanced,
interoperable Wi-Fi security that addresses many of the
vulnerabilities of Wired Equivalent Privacy (WEP). Instead of
WEP, WPA uses Temporal Key Integrity Protocol (TKIP) for its
data encryption method.
Currently, WPA satisfies some of the requirements in the IEEE
802.11i draft standard. When the standard is finalized, WPA will
maintain forward compatibility.
WPA runs in 802.1x (Enterprise) mode or PSK (Pre-Shared Key)
mode:
In Enterprise mode, WPA provides user authentication using
802.1x and the Extensible Authentication Protocol (EAP).
That is, an authentication server (such as a RADIUS server)
must authenticate each device before the device can
communicate with the wireless network.
In PSK mode, WPA provides user authentication using a
shared key between the authenticator and the CV30. WPA-
PSK is a good solution for small offices or home offices that
do not want to use an authentication server.
To use WPA security, you need:
an authentication server (Enterprise mode only).
an access point with an 802.11 b/g radio that supports WPA.
Note:
You can also use a MobileLAN access point with
software release 1.80 or later as an authentication server. For
help, see the system manual for your access point.