Motorola 7545MBW User Manual page 289

Omnii hand-held computer
Table of Contents

Advertisement

Wireless Properties
Wireless Properties
Figure H-15
Type the appropriate SSID (Service Set Identifier) in the Network name (SSID): dialog box. The
Network name field can contain a maximum of 32 characters. The name assigned here is listed as
a preferred network.
IMPORTANT
Keep in mind that the Omnii will only communicate with access
points that are configured with the same SSID.
Ad Hoc And Infrastructure: If you are using an Infrastructure network — one in which the hand-helds
must pass data through an access point — leave the check box next to This is an ad hoc network blank.
If you are using an Ad Hoc network — a network in which the hand-helds pass data directly to other Ad
Hoc devices without an access point — add a checkmark in the check box next to This is an ad hoc
network to enable Ad Hoc.
Encryption: WEP (Wired-Equivalent Privacy) encryption prevents others from accidentally accessing your
network. If you are not using encryption, you can choose Disabled from the drop-down encryption menu.
Otherwise, leave this field as is.
AES (Advanced Encryption Standard) is a standard for protecting data through encryption. AES
supports key sizes of 128 bits, 192 bits and 256 bits and will serve as a replacement for the Data
Encryption Standard (DES), which has a key size of 56 bits. In addition to the increased security that
comes with larger key sizes, the AES algorithm is a symmetrical block cipher that can encrypt (encipher)
and decrypt (decipher) information.
Authentication: 802.11 supports several subtypes of network authentication services: Open, Shared,
WPA, and WPA-PSK. Under Open authentication, any wireless station can request authentication. The
station that needs to authenticate with another wireless station sends an authentication management
frame that contains the identity of the sending station. The receiving station then sends back a frame that
indicates whether it recognizes the identity of the sending station.
Under Shared authentication, each wireless station is assumed to have received a secret shared key over
a secure channel that is independent from the 802.11 wireless network communications channel.
Under WPA and WPA-PSK authentication, the use of 802.1x authentication is required. For wireless net-
works without a Remote Authentication Dial-In User Service (RADIUS) infrastructure, WPA supports the
use of a preshared key. For wireless networks with a RADIUS infrastructure, Extensible Authentication
Protocol (EAP) and RADIUS is supported.
Network Key: This text box is used to specify a 5 or 13 ASCII character sequence or an equivalent 10 or
26 Hexadecimal digit sequence that matches the active WEP key on the access point.
To assign a Network key, highlight The key is provided automatically, and uncheck the check box to
disable this option.
Wireless Zero Config Settings H - 5

Advertisement

Table of Contents
loading

This manual is also suitable for:

7545mbwmGm37545mbwp7545mbwpGm37545mbwGm37545mbwm

Table of Contents