Honeywell Thor VM2 User Manual page 12

Vehicle-mount computer with microsoft windows embedded ce 6.0
Hide thumbs Also See for Thor VM2:
Table of Contents

Advertisement

Chapter 8 - Wireless Network Connections
Summit Wireless Network Configuration ............................................................................. 8-1
Important Notes ................................................................................................................... 8-1
Summit Client Utility ............................................................................................................ 8-1
Help ............................................................................................................................... 8-1
Summit Tray Icon........................................................................................................... 8-1
Wireless Zero Config Utility ........................................................................................... 8-2
To Switch Control to the Wireless Zero Config Utility .............................................. 8-2
To Switch Control to SCU........................................................................................ 8-2
Main ............................................................................................................................... 8-3
Auto Profile .............................................................................................................. 8-3
Admin Login............................................................................................................. 8-4
Profile............................................................................................................................. 8-5
Buttons..................................................................................................................... 8-5
Profile Parameters ................................................................................................... 8-6
Using CKIP .............................................................................................................. 8-7
Status............................................................................................................................. 8-8
Diags.............................................................................................................................. 8-9
Global .......................................................................................................................... 8-10
Custom .................................................................................................................. 8-11
Global Parameters................................................................................................. 8-11
Sign-On vs. Stored Credentials ......................................................................................... 8-14
To Use Stored Credentials .......................................................................................... 8-14
To Use Sign On Screen............................................................................................... 8-14
Windows Certificate Store vs. Certs Path.......................................................................... 8-15
User Certificates .......................................................................................................... 8-15
Root CA Certificates .................................................................................................... 8-15
To Use the Certs Path ........................................................................................... 8-16
To Use Windows Certificate Store......................................................................... 8-16
Configuring the Profile ....................................................................................................... 8-17
No Security .................................................................................................................. 8-17
WEP............................................................................................................................. 8-18
LEAP............................................................................................................................ 8-19
PEAP/MSCHAP........................................................................................................... 8-20
PEAP/GTC................................................................................................................... 8-22
WPA/LEAP .................................................................................................................. 8-24
EAP-FAST ................................................................................................................... 8-25
EAP-TLS...................................................................................................................... 8-27
WPA PSK .................................................................................................................... 8-29
Certificates......................................................................................................................... 8-30
Quick Start ................................................................................................................... 8-30
Generate a Root CA Certificate ................................................................................... 8-30
Install a Root CA Certificate......................................................................................... 8-32
Generate a User Certificate ......................................................................................... 8-33
Install a User Certificate............................................................................................... 8-37
Verify Installation ................................................................................................... 8-38
Chapter 9 - Key Maps
10

Advertisement

Table of Contents
loading

Table of Contents