Configuring Microsoft Security - Intermec CK61 User Manual

Mobile computer with windows mobile
Hide thumbs Also See for CK61:
Table of Contents

Advertisement

CK61 Mobile Computer with Windows Mobile User's Manual
• Check any of these options, then click OK.
Setting
Description
Detect Rogue APs
Wireless NICs and APs associate based on the SSID configured
for the NIC. Given an SSID, the BSSID with the strongest
signal is often chosen for association. After association, 802.1x
authentication may occur and during authentication credentials
to uniquely identify a user - these are passed between the NIC
and the AP.
Base 802.1x technology does not protect the network from
"rogue APs." These can mimic a legitimate AP to authentication
protocols and user credentials. This provides illegal users ways to
mimic legitimate users and steal network resources and
compromise security.
Check this box to detect and report client behavior suspected of
being rogue APs. Once a rouge AP is detected, your CK61 no
longer associates with that AP until you perform a clean boot.
Clear this box to solve AP connection problems that result when
an AP gets put on the rogue list due to inadvertent failed
authentications, not because it is a real rogue.
Enable mixed cell
Mixed cell is a profile-dependent setting. If enabled, using WEP,
you can connect to access points that allow the optional use of
encryption.
Allow fast roaming
When using a wireless LAN that uses Cisco Access Points, a
(CCKM)
LEAP-enabled client device can roam from one access point to
another without involving the authentication (RADIUS) server.
If enabled, an access point configured to provide Wireless
Domain Services (WDS) takes the place of the RADIUS server
(caching credentials of an initial authentication with the
RADIUS server) and authenticates the client without
perceptible delay in voice or other time-sensitive applications.
Enable Logging
Check this box to log what activity occurs for this profile.

Configuring Microsoft Security

The default security setting is Funk. If you want to use Microsoft security,
you need to select it as your security choice.
Chapter 5 — Network Support
161

Advertisement

Table of Contents
loading

Table of Contents