Summit Wireless Security; Sign-On Vs. Stored Credentials - LXE MX8WM Reference Manual

Windows mobile operating system handheld
Table of Contents

Advertisement

Summit Wireless Security

Summit Wireless Security
Use the instructions in this section to complete the entries on the Profile tab according to the type of wireless security used by
your network. The instructions that follow are the minimum required to successfully connect to a network. Your system may
require more parameter settings than are listed in these instructions. Please see your System Administrator for complete
information about your network and its wireless security requirements.
Default profile
Switching profiles
Adding, changing or renaming
profiles
Note: The SCU will display a reminder if the Commit button is not clicked before an attempt is made to close or browse
away from the Profile tab. The reminder feature may not be present in all versions. Contact your
version upgrades.

Sign-On vs. Stored Credentials

When using wireless security that requires a user name and password to be entered, the Summit Client Utility offers two
choices:
The Username and Password may be entered on the Credentials screen. If this method is selected, anyone using the
l
mobile device can access the network.
The Username and Password are left blank on the Credentials screen. When the mobile device attempts to connect to
l
the network, a sign on screen is displayed. The user must enter the Username and Password at that time to authen-
ticate.
Note: It is important that all dates are correct on mobile/desktop computers when using any type of certificate.
Certificates are date sensitive and if the date is not correct authentication will fail.
How to: Use Stored Credentials
1. After completing the other entries in the profile, tap the Credentials button.
2. Enter the Username and Password on the Credentials screen and tap the ok button.
3. Tap the Commit button.
4. For LEAP and WPA/LEAP, configuration is complete.
5. For PEAP-MSCHAP, PEAP-GTC and EAP-TLS import the CA certificate into the Windows certificate store.
6. For EAP-TLS, also import the User Certificate into the Windows certificate store.
7. Access the Credentials screen again. Make sure the Validate server and Use MS store checkboxes are checked.
8. The default is to use the entire certificate store for the CA certificate. Alternatively, use the Browse button next to the
CA Cert (CA Certificate Filename) on the Credentials screen to select an individual certificate.
LXE recommends editing the Default profile instead of creating new profiles. Important:
Perform a Suspend/Resume key sequence after changing parameters to save the
changed parameters in the registry.
Successfully connecting after switching from one profile to another may take up to 30
seconds from the moment the "Is not authenticated" or "Is not Associated" messages are
displayed.
LXE recommends performing a Suspend/Resume key sequence after tapping the Commit
button.
E-EQ-MX8WMRG-C [ 212  ] MX8WM Reference Guide
LXE representative
for

Advertisement

Table of Contents
loading

Table of Contents