Intermec CV41 CV41 Vehicle Mount Computer (Windows Embedded Standard) User Man - Page 70

Choose Between Microsoft and Wireless Security, Choose Between, Microsoft and Wireless Security.

Page 70 highlights

Chapter 4 - Configure the Computer You must use either Wireless or Microsoft security to implement your security solution. For details, see the next section, "Choose Between Microsoft and Wireless Security." Intermec recommends that you always implement WPA2 security using PSK (Personal) or 802.1X (Enterprise) key management. If you are using WPA-802.1x, WPA2-802.1x, or 802.1x security, this section also assumes that your authentication server and authenticators are properly configured. Note: Your security choice does not depend on your authentication server. For example, you can choose Wireless security if you use Microsoft Active Directory® to issue certificates. Choose Between Microsoft and Wireless Security The computer supports both Wireless and Microsoft security, which dynamically select wireless networks based on your preferences. The option you choose depends on your network security needs. • If you are primarily using the computer to connect to Wi-Fi hotspots, you may want to use Microsoft security. Microsoft security is enabled by default. If it is not, enable it. For help, see "Select Microsoft Security" on page 59 • If you are using the computer in a static environment that requires a high level of security, you should use Wireless security, which offers CCX v4.0 compliance, support for LEAP and TTLS, and configuration for up to four profiles. To use Wireless security, you need to select Wireless security as your seucrity choice and select profile. For help, see the next section, "Select a Wireless Security Profile" on page 64. 58 CV41 Vehicle Mount Computer (Windows Embedded Standard) User Manual

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150

Chapter 4 — Configure the Computer
58
CV41 Vehicle Mount Computer (Windows Embedded Standard) User Manual
You must use either Wireless or Microsoft security to implement your
security solution. For details, see the next section,
“Choose Between
Microsoft and Wireless Security.”
Intermec recommends that you
always implement WPA2 security using PSK (Personal) or 802.1X
(Enterprise) key management.
If you are using WPA-802.1x, WPA2-802.1x, or 802.1x security, this
section also assumes that your authentication server and
authenticators are properly configured.
Choose Between Microsoft and Wireless Security
The computer supports both Wireless and Microsoft security, which
dynamically select wireless networks based on your preferences. The
option you choose depends on your network security needs.
If you are primarily using the computer to connect to Wi-Fi
hotspots, you may want to use Microsoft security.
Microsoft security is enabled by default. If it is not, enable it. For
help, see
“Select Microsoft Security” on page 59
If you are using the computer in a static environment that requires
a high level of security, you should use Wireless security, which
offers CCX v4.0 compliance, support for LEAP and TTLS, and
configuration for up to four profiles.
To use Wireless security, you need to select Wireless security as your
seucrity choice and select profile. For help, see the next section,
“Select a Wireless Security Profile” on page 64
.
Note:
Your security choice does not depend on your authentication
server. For example, you can choose Wireless security if you use
Microsoft Active Directory® to issue certificates.