Using 802.1X Security; Using Leap Security - Intermec CK32 User Manual

I-safe handheld computer
Hide thumbs Also See for CK32:
Table of Contents

Advertisement

Using 802.1x Security

Using LEAP Security

CK32 I-Safe Handheld Computer User's Manual
To use WEP security, you need:
• a CV30 with an 802.11b/g radio.
• an access point with an 802.11b/g radio.
802.1x security provides centralized user authentication using an
authentication server, authenticators (access points), and
supplicants. These components communicate using an EAP
authentication type, such as TLS (Transport Layer Security) or
PEAP (Protected Extensible Authentication Protocol). 802.1x
security provides data encryption using dynamic WEP key
management.
To use 802.1x security, you need:
• an access point with an 802.11b/g radio.
• a CK32 I-Safe with an 802.11b/g radio and the 802.1x/WPA
security option.
• an authentication server.
Lightweight Extensible Authentication Protocol (LEAP), also
known as Cisco-Wireless EAP, provides username/password-
based authentication between a wireless client and a RADIUS
server. In the 802.1x framework, traffic cannot pass through an
Ethernet hub or wireless network access point until it successfully
authenticates itself.
The station must identify itself and prove that it is an authorized
user before it is actually allowed to use the LAN. LEAP also
delivers a session key to the authenticated station, so that future
frames can be encrypted with a key that is different than keys
used by other sessions.
To use LEAP security, you need:
• a RADIUS server.
• Cisco access points.
LEAP security is not supported with Microsoft security.
Chapter 3 — Configuring the CK32 I-Safe
63

Advertisement

Table of Contents
loading

Table of Contents