Wireless Network - Intermec CK60 User Manual

Mobile computer with windows mobile
Hide thumbs Also See for CK60:
Table of Contents

Advertisement

Wireless Network

Encryption
AES (Advanced Encryption
Standard)
CKIP (Cisco Key Integrity
Protocol)
TKIP (Temporal Key Integrity
Protocol)
WEP (Wired Equivalent Privacy)
encryption
CK60 Mobile Computer with Windows Mobile User's Manual
Your wireless adapter (network interface card) connects to wireless
networks of two types: infrastructure networks and ad-hoc networks.
• Infrastructure networks get you onto your corporate network and the
internet. Using the 802.11b/g infrastructure mode, the CK60 establishes
a wireless connection to an access point, linking you to the rest of the
network.
• Ad-hoc networks are private networks shared between two or more
clients, even with no access point.
Each wireless network is assigned a name (or Service Set Identifier - SSID)
to allow multiple networks to exist in the same area without infringement.
Intermec recommends using security measures with wireless networks to
prevent unauthorized access to your network and to ensure your privacy of
transmitted data. Authentication (cryptographically protected) by both the
network and the user, transmitted data, and encryption are required
elements for secure networks. Schemes are available to implement the
features.
A block cipher, a type of symmetric key cipher that uses groups of bits of a fixed
length - called blocks. A symmetric key cipher is a cipher using the same key for
both encryption and decryption.
As implemented for wireless, this is also known as CCMP, which implements
AES as TKIP and WEP are implementations of RC4.
This is Cisco's version of the TKIP protocol, compatible with Cisco Aironet
products.
This protocol is part of the IEEE 802.11i encryption standard for wireless
LANs., which provides per-packet key mixing, a message integrity check and a
re-keying mechanism, thus overcoming most of the weak points of WEP. This
encryption is more difficult to crack than the standard WEP. Weak points of
WEP include: No Initiation Vector (IV) reuse protection, weak keys, no
protection against message replay, no detection of message tampering, and no key
updates.
With preconfigured WEP, both the client CK60 and access point are assigned
the same key, which can encrypt all data between the two devices. WEP keys also
authenticate the CK60 to the access point - unless the CK60 can prove it knows
the WEP key, it is not allowed onto the network. WEP keys are only needed if
they are expected by your clients. There are two types available: 64-bit
(5-character strings, 12345) (default) and 128-bit (13-character strings,
1234567890123). Enter these as either ASCII (12345) or Hex (0x3132333435).
Chapter 5 — Network Support
161

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents