Intermec Technologies 03CN3 CN3 User Manual CN3 Mobile Computer User s Manual PRELIMINARY

Intermec Technologies Corporation CN3 CN3 Mobile Computer User s Manual PRELIMINARY

User Manual part 2 of 2

CN3 Mobile Computer User’s Manual - PRELIMINARY 693Configuring the ComputerThere are multiple ways to get an application to your CN3 Mobile Com-puter; like there are multiple ways to package the application for delivery.Note: Desktop icons and settings applet icons are shown to the left. Any place that Start is mentioned, tap the following Windows icon in the top, left corner of your CN3 desktop.
Chapter 3 — Configuring the Computer70 PRELIMINARY - CN3 Mobile Computer User’s ManualDeveloping Applications for the ComputerCN3Computers run applications programmed in Microsoft Visual Studios 2005. Use this chapter to understand what you need to develop a new application for the CN3 Computer.To develop applications for your CN3 Computer, use the Resource Kits in the Intermec Developer Library (IDL). Download the IDL from the Inter-mec web site at www.intermec.com/idl. Contact your Intermec representa-tive for more information.You need the following hardware and software components to use the resource kits:• Pentium desktop, 400 MHz or higher• Windows 2000 (Service Pack 2 or later) or Windows XP (Home, Profes-sional, or Server)• For native and managed development, Microsoft Visual Studio 2005• 128 MB RAM (196 MB recommended)• 360 MB hard drive space for minimum installation (720 MB for com-plete)• CD-ROM drive compatible with multimedia desktop specification• VGA or higher-resolution monitor (Super VGA recommended)• Microsoft Mouse or compatible pointing devicePackaging Applications for the CN3 ComputerUse any of these methods to package applications for installation:• You could package an application as a cabinet (CAB) file. Recommended• For simple applications, the application itself may be the file to deliver.• It could be a directory structure that contains the application, supporting files like ActiveX controls, DLLs, images, sound files, and data files.Consider any of these when choosing a storage location for applications:• In the basic CN3 Computer, there are two built-in storage options: the Object Store and the Flash File Store. The Object Store is a Disk on Chip (DOC) Flash that looks like a disk. The Flash File Store is an area of storage which is embedded in a section of the system’s FLASH mem-ory. This storage area is not erased during a clean-boot.• If the optional Secure Digital storage card is in the system, then consider this card the primary location for placing an applications install files. This storage card creates the “\Storage Card” folder.Note: Microsoft eMbedded Visual C++ 4.0 may be used, but some features are not available.
Chapter 3 —  Configuring the ComputerCN3 Mobile Computer User’s Manual - PRELIMINARY 71• Use the small nonvolatile Flash File Store region to hold CAB files that rebuild the system at clean-boot or install applications from a CAB file into the Flash File Store so they are “ready-to-run” when a clean-boot is performed. Since the FLASH in the system has a limited number of write cycles, do not use the Flash File Store for excessive writing pur-poses; however, reading is okay.Installing Applications on the ComputerAny of these options can move items to locations on your CN3 Computer: Microsoft ActiveSync (page 71), Secure Digital storage cards (page 72), Wavelink Avalanche (page 72), or SmartSystems™ Console (page 73).Using Microsoft ActiveSyncYou can use Microsoft ActiveSync to establish a connection between your desktop and the CN3 Computer. Microsoft ActiveSync transfers files, syn-chronizes files, remote debugging, and other device management activities.See Chapter 2, “Windows Mobile” for information about the Microsoft ActiveSync application as provided by Microsoft Corporation.This can be a USB Microsoft ActiveSync connection. Files can be copied using Windows Explorer on a desktop or a laptop computer. This is usually good when updating few CN3 Computers.These instructions assume that Microsoft ActiveSync was installed onto your desktop and is up and running. If not, go to Chapter 2, “Windows Mobile” for an URL from which to download the latest application.1Connect your CN3 Computer to your desktop using a USB cable. You may have to detach, then reattach the cable to “wake” the connection.2Wait for a “Connected” message to appear in the Microsoft ActiveSync application to signal a connection to the CN3 Computer. If necessary, select File > Get Connected to initiate a connection or detach, then reat-tach the USB cable.3Click Explore to access the “\Mobile Device” folder on your unit.
Chapter 3 — Configuring the Computer72 PRELIMINARY - CN3 Mobile Computer User’s Manual4From your desktop, select Start > Windows Explorer, then browse the “C:\Intermec\CN3 Mgmt Tools\CabFiles” path for any CAB files needed for your CN3 Computer. Select the appropriate file, right-click the file for a pop-up menu, then select Copy.5Within the “\My Windows Mobile-Based Device” directory, go to the directory where you want the files located on the CN3 Computer, do a right-click for a pop-up menu, then select Paste.6When all of the files are pasted, perform a clean-boot on the CN3 Com-puter. When the computer reboots, wait for the LED on the top left of your keypad to stop blinking. Tap Start > Programs > Windows Explorer to locate the newly copied executable files, then tap these files to activate their utilities.Using a Storage CardIf you have a mini-Secure Digital (SD) storage card for your CN3 Com-puter, this is the best place for you to installation applications.1If you are using a Secure Digital card reader, suspend the CN3 Com-puter, remove its mini-SD storage card, insert it in a mini-SD adapter card, then place it in the reader. For help, see “Using the Storage Card” on page 16.2Copy your application file to the mini-SD card. If you are using Microsoft ActiveSync to copy the files to the mini-SD card, place the application in the “\Storage Card” folder on the CN3 Computer.3If using a Secure Digital card reader, insert the mini-SD card back into the CN3 Computer.4Navigate to the “\Storage Card” folder and run your application. After your application is installed, you can run it from the Programs menu.Using Wavelink AvalancheYou can use the Wavelink Avalanche device management system to install applications on all of your wireless CN3 Computers.The wireless CN3 Computer ships with the Avalanche Enabler already loaded on it. The Avalanche Enabler is configured to activate automatically (typically on a clean boot).When the Avalanche Enabler is activated, the CN3 Computer attempts to connect to the Avalanche Agent. When the CN3 Computer connects to the Agent, the Agent determines whether an update is available and immedi-ately starts the software upgrade, file transfer, or configuration update.Note: If you manually activate the Avalanche Enabler on the CN3 Com-puter, you may be prompted for a password when you exit the Avalanche Enabler. The default password is leave.
Chapter 3 —  Configuring the ComputerCN3 Mobile Computer User’s Manual - PRELIMINARY 73To use Avalanche to remotely manage the CN3 Computer1Use the Avalanche Management Console to install software packages and updates for the CN3 Computer. For help using the console, see the online help.2Schedule the CN3 Computer updates or manually initiate an update using the Avalanche Management Console. For information on using Wavelink Avalanche, contact your local Intermec representative or visit the Wavelink web site at www.wavelink.com.Using the SmartSystems ConsoleTo use SmartSystems Console to install an application file1Download the file from the Intermec web site, unzip it on your desktop.2From the SmartSystems Console, drag-and-drop the application onto each CN3 Computer discovered in your network.To download SmartSystems Foundation, go to www.intermec.com/idl and open the Device Management page. For information on using the Smart-Systems Console, see its online help.Updating the System SoftwareWhen you upgrade your CN3 Computer, you are updating the operating system (OS) and the SmartSystems Platform Bundle (SSPB) files.The SSPB files are stored on the DiskOnChip, and deliver Intermec Value-Added (IVA) functionality such as data collection, unit configuration and diagnostics, and Intermec’s wireless security suite. As new features are added to these components, you can upgrade your SSPB files without need-ing to upgrade the operating system image. Similarly, features added to the operating system images do not affect the functionality of the SSPB, and you can choose to upgrade only the operating system image.There are two ways to upgrade the CN3 Computer:• You can use a mini-SD card to upgrade the CN3 Computer. For help, see below.• You can use the SmartSystems Console to upgrade the CN3 Computer. For help, see “Using the SmartSystems Console to Upgrade the CN3 Computer” on page 76.You need to download the latest upgrade files from the Intermec web site to your desktop or laptop computer, then determine if you will upgrade both the operating system and SSPB files, just the operating system files, or just the SSPB files.You can use the SmartSystems Console to drag-and-drop Intermec applica-tions onto your CN3 Computers. The CN3 Computer ships with the SmartSystems client loaded on it. The console is part of SmartSystems Foundation and is available from the Intermec web site.
Chapter 3 — Configuring the Computer74 PRELIMINARY - CN3 Mobile Computer User’s Manual1Start your web browser and go to the Intermec web site at www.inter-mec.com.2Go to Service & Support > Downloads.3Select Computers: CN3 Mobile Computer from the drop-down list.4Select which download you need. Make sure the download you select is for the CN3 Computer.5Look at the description (or the ReadMe file) to determine if this down-load will upgrade both the operating system and SSPB files, just the operating system, or just the SSPB. You will need this information later.6Close the link and download the .zip file to your desktop or laptop com-puter.7If you are using a mini-SD card to upgrade the CN3 Computer, see the next page.If you are using the SmartSystems Console to upgrade the CN3 Com-puter, see “Using the SmartSystems Console to Upgrade the CN3 Computer” on page 76.Using a Storage Card to Upgrade the ComputerTo use a mini-SD storage card to upgrade the CN3 Computer, you need a Secure Digital card reader and a mini-SD storage card formatted as FAT16.• For both the operating system and SSPB files, see “Upgrading Both Operating System and SSPB Files” on page 74.• For just the operating system, see “Upgrading the Operating System” on page 75.• For just the SSPB files, see “Upgrading the SSPB Files” on page 75.Upgrading Both Operating System and SSPB FilesYou may download files that upgrade both the operating system and SSPB files simultaneously. Note that this is a two-step process.1Extract the upgrade files to a folder on your desktop or laptop computer. Make sure to select the option to use folder names when extracting files.2Place all individual root files onto your mini-SD card, this will update your operating system only. Ignore the SSPB files at that point.3Insert the mini-SD card in the CN3 Computer. For help, see “Using the Storage Card” on page 16.4Remove the battery pack from the CN3 Computer and place the CN3 Computer in a dock connected to external power. For help, see “Using the Batteries” on page 7.Note: The CN3 Computer currently supports Delkin Devices Secure Digi-tal cards only. Intermec cannot guarantee that other mini-SD cards will work with CN3 Computers.
Chapter 3 —  Configuring the ComputerCN3 Mobile Computer User’s Manual - PRELIMINARY 755When the Installation Complete menu appears, remove the mini-SD card. Remove the existing files from the mini-SD card and place all of the files from the SSPB/IVA folder into your mini-SD card. The number of files will vary from version to version.6Insert the mini-SD card in the CN3 Computer.7The operating system will boot and load files from the mini-SD card. The process is complete once the pen calibration screen is visible. After this, remove the files from the mini-SD card.When the CN3 Computer finishes booting, you may use it. You have reset the CN3 Computer to its default configuration. You need to set the date and time and to set its network communications parameters to reestablish communications with the other devices in the wireless network.Upgrading the Operating SystemYou may download files that upgrade only the operating system. Note this upgrade only works when the CN3 Computer is connected to external power.1Extract the upgrade files to a mini-SD card.2Remove the battery pack from the CN3 Computer and place the CN3 Computer in a dock connected to external power. For help, see “Using the Batteries” on page 7.3Insert the mini-SD card in the CN3 Computer. For help, see “Using the Storage Card” on page 16.4When the Installation Complete menu appears, remove the mini-SD card, then press the Reset button again.When the CN3 Computer finishes booting, you may use it. You have reset the CN3 Computer to its default configuration. You need to set the date and time and to set its network communications parameters to reestablish communications with the other devices in the wireless network.Upgrading the SSPB FilesYou may download files that upgrade only the SSPB files.1Extract the upgrade files to a mini-SD card.2The operating system will boot and load files from the mini-SD card. The process is complete once the pen calibration screen is visible. After this, remove the files from the mini-SD card.When the CN3 Computer finishes booting, you may use it. You have reset the CN3 Computer to its default configuration. You need to set the date and time and to set its network communications parameters to reestablish communications with the other devices in the wireless network.
Chapter 3 — Configuring the Computer76 PRELIMINARY - CN3 Mobile Computer User’s ManualUsing the SmartSystems Console to Upgrade the CN3 ComputerUse the SmartSystems Console to upgrade the CN3 operating system. The console is part of SmartSystems Foundation and is available from the Inter-mec web site via the IDL. Before upgrading the CN3 Computer, you need the following:• the SmartSystems Foundation. To download SmartSystems Foundation, go to www.intermec.com/idl and open the Device Management page.• the device upgrade .exe file, which is available from the Intermec web site at www.intermec.com. Go to Service & Support > Downloads.1Install SmartSystems Foundation on your desktop or laptop computer, then open the SmartSystems Console.2Make sure the SmartSystems Console and the CN3 Computers are on the same subnet. For help, contact your Intermec representative.3Make sure your CN3 Computers are either in a communications dock or charging dock, or that power management is disabled.4Download the device upgrade .exe file to your desktop or laptop com-puter, then double-click the file to start the InstallShield application.5From the SmartSystems Console, locate the device upgrade to install.6Drag-and-drop the device upgrade onto each CN3 Computer icon.Once the upgrade is done downloading to your CN3 Computer, your CN3 Computer replaces the operating system, then automatically performs a clean boot.Launching Your Application AutomaticallyYou can configure the various media used in the Windows Mobile system with a folder name and can change the media in the registry of the system. Many of the startup components rely on folder names to locate information files, applications, or other related data.Note: Do not change the default location where InstallShield extracts the files. The SmartSystems Console requires files to be in this location.The SmartSystems Console shows your CN3 Computer as offline (via a red stop sign) until the device reboots and reconnects to the system.Note: This describes the system component startup for Intermec provided components only. It does not describe the bootstrap loader process. It only describes the component installation process provided by Windows Mobile. It is assumed that you understand the Microsoft Mobile startup procedures and are familiar with how Microsoft components start up.
Chapter 3 —  Configuring the ComputerCN3 Mobile Computer User’s Manual - PRELIMINARY 77The registry keys used by FolderCopy and other startup components to retrieve the folder names are as follows:Flash File Store[HKLM\Drivers\BuiltIn\FlshDrv]“FolderName”=“Flash File Store”SD Card (Storage Card)[HKLM\System\StorageManager\Profiles\SDMemory]“Folder”=“Storage Card”Disk On Chip[HKLM\System\StorageManager\Profiles\TRUEFFS_DOC]“Folder”=“DiskOnChip”During normal Windows Mobile system startup, there are Intermec-spe-cific and non-Intermec components that require an orderly start to properly function. These non-Intermec components may also need to start them-selves so the Windows Mobile device can function properly. Since there are possible configurations that come from using one or more optional built-in peripheral devices, the platform components starting on the next page are required to manage startup.RunAutoRunSystem components are installed and configured during the power up pro-cess from a single starting point. RunAutoRun (RUNAUTORUN.EXE), built into the operating system image and located in the “\Windows\Star-tup” folder, checks for AutoExec (AUTOEXEC.EXE) in a “\SYSTEM” folder on a mounted volume in this order:•mini-SD• Object Store - may be non-volatile storage or RAM• Disk on Chip - may map as Object Store• Flash File Store - may map as Object Store. This is the default location for the AutoExec program in Intermec systems. Intermec system applica-tions are started from this folder. The ordering of mounted volumes overrides this feature.Folder names used for the mounted volumes above are retrieved from the registry to maintain coherence with the naming of the mounted volumes on the platform. These folder names are not hard-coded. If AutoExec is present in the “\SYSTEM” folder on any of these media, it executes the program only on the first media it is found on and no other.AutoExec is reserved for Intermec use to configure Intermec-specific appli-cations. It launches the CAB installer, AutoCab (AUTOCAB.EXE), to install platform cab files to the system, such as Intermec Data Collection.When the AutoExec is complete, RunAutorun then checks for the existence of AutoRun (AUTORUN.EXE) and executes this program from the first media it is found on. This order is the same as what is used by AutoExec.
Chapter 3 — Configuring the Computer78 PRELIMINARY - CN3 Mobile Computer User’s ManualAutoRun is reserved for customer use to configure application launch sequences. It launches the AutoCab installer and any customer programs added to the AUTOUSER.DAT file. The hierarchy of these files is shown below.AutoExecAutoExec (AUTOEXEC.EXE) automates operations such as pausing, launching processes, or signaling, and is configured through the AutoExec data file (AUTOEXEC.DAT). This script file must be in the same direc-tory as the program itself. Usage: AutoExec [-%[W]] [-E=["X"]] [-F=["Y"]] [-LOG=] [-W=[Z]]Process return code uses standard error codes defined in WINERROR.H.Note: Intermec considers the usage of the AutoExec data file as “Intermec Private.” AutoExec installs Intermec applications such as Data Collection, Security Supplicants, Intermec Management, applets, and shortcuts from components found in the Flash File System. Do not modify the AutoExec data file. Instead, use the AutoRun program to add software components.-% Passes an ID to use in a call to SignalStarted. This argument is useful only during system startup that relies on a SignalStarted to call. W is an integer value.-E Passes a signal event name to use when autoexec completes. X is a string value.-F Overrides the data file to use. This must be a fully qualified name. Default is “autoexec.dat” in the same location as the AUTOEXEC.EXE program. Y is a string value.-LOG Set to any value logs activity to AUTOEXEC.TXT (in the same location as the AUTOEXEC.EXE pro-gram). Default is disabled.-W Pauses the autoexec process by calling sleep for the number of seconds specified by Z. Z is an integer value.runautorun autoexec  autorun autocopy  autoreg  foldercopy  customer applications  autocab autocab
Chapter 3 —  Configuring the ComputerCN3 Mobile Computer User’s Manual - PRELIMINARY 79Keywords that AutoExec supports are:Examples of keyword usage are as follows:; Allow message pop up if an error occurs.QUIET 0; Log any debug output to a trace file.LOGGING 1; Perform a SetEvent on the event name "autoexec_started".SIGNAL "autoexec_started"; Include this child data file, childexec.dat.CALL "\childexec.dat"; Use autocopy to copy the audio control panel from flash file store to the windows directory. Wait for up to 60 seconds for it to exit.EXEC "\Flash File Store\SYSTEM\autocopy.exe" -S"\Flash File Store\Sys-tem\CPLAudio.cpl" -D"\Windows\CPLAudio.cpl"; Change the default EXEC wait time to 90 seconds.EXECWAIT 90; Suspend processing any commands for 10 seconds.WAIT 10; Suspend processing any commands until event called MyEventName is signaled.WAITFOR "MyEventName"AutoRunAutoRun (AUTORUN.EXE) automates operations such as launching other processes and is configured through the AutoRun data file (AUTORUN.DAT). This file must be in the same directory as the program itself.QUIET Enables user notification when an error occurs.LOGGING Enables logging to a trace file.SIGNAL Enables the specified named event and is immediately signaled. Useful for notifying other compo-nents of the current status.CALL Opens another .DAT file to process. After the called file is completed, this file is resumed.RUN Runs a program with a SW_SHOWNORMAL attribute. Autoexec does not wait for the child process to exit.LOAD Runs a program with a SW_HIDE attribute. Autoexec waits for 60 seconds for the child process to exit or EXECWAIT seconds if set.EXEC Runs the specified program. AutoExec waits 60 seconds for the child process to exit or EXECWAIT seconds if set.EXECWAIT Changes the default EXEC wait time from 60 seconds to the number of seconds specified. There is a maximum 10-minute limit imposed.WAIT Forces a sleep for the specified number of seconds to occur.WAITFOR Forces a sleep until the named event is signaled.
Chapter 3 — Configuring the Computer80 PRELIMINARY - CN3 Mobile Computer User’s ManualAutoRun supports the following script commands in AUTOUSER.DAT and AUTORUN.DAT.AutoRun handles quoted file names for the first parameter to allow specify-ing path names or file names that contain white space. Note only one set of quotes per command is supported. AUTORUN.DAT entry examples:AutoCopyAutoCopy (AUTOCOPY.EXE) copies/moves files between locations. It has no user interface and is configured through command line arguments. It has support for the following parameters, in no particular order:Usage: AutoCopy [-D["W"]] [-L["X"]] [-M[D]] [-Q[Y]] [-S["Z"]] Process return code uses standard error codes defined in WINERROR.H.Example:; use AutoCopy to copy the control panel from flash file store to windows. autocopy.exe -S"\Flash File Store\System\Audio.cpl" -D"\Windows\Audio.cpl"; use AutoCopy to move the control panel from flash file store to windows. autocopy.exe -M1 -S"\Flash File Store\System\Audio.cpl" -D"\Windows\Audio.cpl"Note: If you need to add steps at boot time, add them to AUTOUSER.DAT, not to AUTORUN.DAT. AUTORUN.DAT is pro-vided by Intermec and is subject to change. AUTOUSER.DAT is the des-ignated place for the end user to add steps to the boot time process.EXEC Launches a specified program, waits for it to complete (up to 10 minutes).CALL Processes a specified file of commands and returns.CHAIN Processes a specified file of commands and does not return.RUN Loads a specified program and executes it.LOAD Loads a specified program and executes it.RUN “Flash File Store\Apps\some.exe” arg1, arg2, arg3CALL “Flash File Store\2577\usercmds.dat”-D Indicates the destination file name and must be fully qualified. W is a string value.-L Indicates a fully qualified file name for logging to enable. Default is disabled. X is a string value.-M Moves file to a destination rather than copies the file. Default value is disabled. D is an integer value. D=1 indicates enabled, 0 is disabled.-Q Indicates if a message box should appear when an error occurs. Default is disabled. Y is an integer value.-S Indicates a source file name and must be fully qualified. Z is a string value.
Chapter 3 —  Configuring the ComputerCN3 Mobile Computer User’s Manual - PRELIMINARY 81AutoRegThe AutoReg (AUTOREG.EXE) component adds registry information to the Windows Mobile registry. It has no user interface and is configured through command line arguments. Usage: AutoReg [-D] [-HKey] [-Q] “filename”Process return code uses standard error codes defined in WINERROR.H.Example:; use AutoReg to install this registry information.autoreg.exe "\Flash File Store\install.reg"; use AutoReg to install this registry information. Delete the file afterwards.autoreg.exe -D "\Flash File Store\install.reg"; use AutoReg to extract registry information to a file. autoreg.exe -HHKEY_LOCAL_MACHINE\Software\Intermec\Version "\version.reg"The format of the input file, in this example, is the standard registry format which should ease the creation of the input file since there are many pub-licly available utilities to generate a registry file besides Notepad. One example of a tool is the Microsoft Remote Registry Editor.AutoCabAutoCab (AUTOCAB.EXE) extracts files, registry settings, and shortcuts from Windows Mobile cabinet (.CAB) files. The Windows Mobile startup sequence invokes AutoCab as a part of AutoExec and AutoRun. During the Windows Mobile startup sequence, AutoCab processes all CAB files in the “\CabFiles” directory relative to the current location of Autocab, unless the location is overridden by command line arguments. AutoCab can run as a stand-alone program to install a CAB file or a directory of CAB files.AutoCab only installs the CAB file if it was not installed before by Auto-Cab. To track the installation of a CAB file, AutoCab marks the CAB file with the System attribute. This attribute is ignored if the device is perform-ing a clean-boot on a non-persistent file system.AutoCab preserves the CAB file after installation if the ReadOnly attribute is set. If not set, the CAB file is deleted automatically after installation. Command line switches are described as follows.Usage:AutoCab [-ChkRst=][-File=][-Force][-Log=][-Move=][-Quiet=][-Show=][-Signal=]-D Deletes the registry file after successfully loading it. This allows for systems that have hives implemented.-H Saves the registry path, and all child entries, to the specific .REG registry file.-Q Indicates whether a message box should appear when a fatal error occurs.filename Fully qualified file name to read from or write to, encased in double quotes to support spaces in paths or file names. See examples below.
Chapter 3 — Configuring the Computer82 PRELIMINARY - CN3 Mobile Computer User’s ManualIf <PathName> references a single CAB file, that file is processed. If <Path-Name> references a directory, all the .CAB files in that directory is pro-cessed. If <PathName> is a wild card pattern, all files matching that pattern is processed, If <PathName> is omitted, InstallCab processes all the .CAB files in directory “\CabFiles.”Example:; Install all cab files in the \Flash File Store\XYZ directory, regardless.AutoCab -FILE="\Flash File Store\XYZ\*.cab" -FORCE; Install only one cab file, use Intermec cab installation displayAutoCab -FILE=”\myCab\app.cab” =show=2Customizing How Applications Load on the ComputerIf you have several processes that you need running in a specific order as the CN3 Computer turns on, you can use the AutoRun system to customize the way applications load. For compatibility with other Intermec comput-ers, you can place a copy of AUTORUN.EXE in the same folder as your AUTORUN.DAT file but it is not required.To create and install the AUTORUN.DAT file on your CN3 Computer1On the CN3 Computer, create a folder called “SYSTEM.”2On your desktop, open the Notepad application.-ChkRst= Set to 1 to configure AutoCab to check for the Reset flag after all CAB files are installed. This file is cre-ated by CAB files that want a clean reset after installation. Default is 0 (do not check for flag).-File= Specifies the CAB files to extract. Note that the specified files need not end with the .CAB extension.-Force Forces the specified CAB files to extract regardless of whether it was previously extracted.-Log= Set to 1 to create a log file in the same folder that AutoCab is running. Useful for debugging CAB installation. Default is 0 (disabled).-Move= Set to 1 to force source CAB file deletion, even when read-only bit set on file. Default is 0 (disabled).-Quiet= Set to 0 to allow AutoCab to display user message box on errors. Useful for debugging CAB installation. Default is 1 (keep quiet).-Show= Set to 0 to prevent showing any installation progress interfaces. Also prevents user from canceling instal-lation. Set to 1 to show normal installation. Set to 2 to show Intermec installation progress interface (user can see what is installing but cannot cancel it). Default is 1 (show normal).-Signal= Set to string name of signal to use at the completion of CAB installation before a reboot occurs (if enabled). AutoCab uses WaitForSingleObject on this name. Default is disabled.
Chapter 3 —  Configuring the ComputerCN3 Mobile Computer User’s Manual - PRELIMINARY 833Write commands for AUTORUN.DAT using these supported script commands:4Save this Notepad file as AUTORUN.DAT.5Copy the AUTORUN.DAT file to the “\SYSTEM” folder on your CN3 Computer.During every boot, the system scans for AUTORUN.DAT in the “\SYSTEM” folder.Here is a sample AUTORUN.DAT file that runs a dialer application and connects to a VPN:EXEC “\Program Files\My Dialer\Dialer.exe” 348-2600EXEC “\Program Files\My VPN\Connect.exe” MyDomainConfiguring CN3 ParametersYou can configure many parameters on the CN3 Computer, such as the bar code symbologies it decodes or the network settings. These characteristics are controlled by configuration parameters. The values you set for these configuration parameters determine how the computer operates. Use con-figuration commands to configure the CN3 Computer.Script Command DescriptionEXEC Launches a specified program and waits up to 10 minutes for it to complete.CALL Processes a specified file of commands, returns. When you use the CALL command, the execu-tion of the current file pauses while a new file that follows the same set of commands executes. Once the new file completes executing, AutoRun.exe processes the current file.CHAIN Processes a specified file of commands and does not return. This command calls another file that follows the same set of commands and stops processing the current file.RUN Loads a specified program and executes it. Specifies the show window attribute so that the user interface is visible when the application launches.LOAD Loads a specified program and executes it. Specifies the hide window attribute so the user inter-face is hidden initially.
Chapter 3 — Configuring the Computer84 PRELIMINARY - CN3 Mobile Computer User’s ManualConfiguring the CN3 Computer With Intermec SettingsUse the Intermec Settings applet to configure the CN3 Computer and view system information. You can access the Intermec Settings applet while run-ning any application.For detailed information on most of the commands available in the Inter-mec Settings applet, see the Intermec Computer Command Reference Manual (P/N: 073529) via the Intermec web site. Go to “Before You Begin” for access information.Synchronizing the CN3 Computer System Time with a Time ServerIt is important that the time on all of your CN3 Computers be synchro-nized with a network time server to ensure real-time communications and updates. Network time servers acquire Coordinated Universal Time (UTC) from an outside source such as the U.S. Naval Observatory (USNO). The CN3 Computer uses Simple Network Time Protocol (SNTP) to synchro-nize with a network time server.The default reference time server is the USNO (tock.usno.navy.mil). To synchronize the time on your CN3 with this time server, you must have a valid connection to the Internet. You can also synchronize the CN3 Com-puter system time with a corporate network server within your firewall that is SNTP-capable. To use an internal corporate network server, you need to set the command name in the registry.Configuring the CN3 Computer through the NetworkYou can change the configuration parameters of the CN3 Computer by sending commands through a host computer or through the network. If you are using a network, you can configure one or more CN3 Computers at a time. You can remotely configure the wireless CN3 Computer by send-ing a command from an application on the host computer. Note that you cannot set all parameters through the network. You can only set those commands that have a syntax in the Command Reference Manual.From the CN3 desktop, select Start > Settings > the System tab > the Intermec Settings icon.
Chapter 3 —  Configuring the ComputerCN3 Mobile Computer User’s Manual - PRELIMINARY 85Configuring the CN3 Computer in a TCP/IP Direct Connect NetworkUse the host computer to configure a wireless CN3 Computer in a TCP/IP network. To send and receive configuration data, write a host application that can communicate with the CN3 Computer directly through an access point or through the network. Use the TMF protocol to send and receive transactions between the host application and the CN3 Computer.To set up the host computer, verify communication with the CN3 Com-puter. To set up the application, prepare and write a host application that can communicate with the IAS and send transactions to and receive trans-actions from the CN3 Computer in this format:where:ExampleIn the host application, you want to get the current values of two configura-tion commands from the CN3 Computer. Send the CG$+NABV transaction from the host applicationwhere:Note: You can continue running an application on the CN3 Computer while configuring it from the host computer.TMF field commandsTMF field A 2-byte field containing one of these values:CG Configuration Get request sent from the host application.Cg Configuration Get response sent from the CN3 Computer to the host computer.CS Configuration Set request sent from the host application.Cs Configuration Set response sent from the CN3 Computer to the host computer.commands The reader and configuration commands to set on the CN3 Computer or the current value to retrieve from the CN3 Computer. To save configuration changes in flash memory, send the .+1 reader com-mand as the last command. See the Command Reference Manual for a list of commands.Note: The transaction header is not shown in this example. You do not need a transaction header for a host application in a TCP/IP network, but you do for a UDP Plus network.CG is a TMF Configuration Get request.$+ is the Change Configuration reader command.BV is the Beeper Volume configuration command.
Chapter 3 — Configuring the Computer86 PRELIMINARY - CN3 Mobile Computer User’s ManualThe computer returns the CgS+BV4 transaction to the host application:Configuring the CN3 Computer in a UDP Plus NetworkUse the host computer to configure a CN3 Computer in your wireless net-work. To send and receive configuration data or files, write a host applica-tion that can communicate with an Intermec Application Server (IAS) formerly Gateway or DCS 30X.For help, see the appropriate Gateway or DCS 30X User’s Manual. Use the Terminal Message Format (TMF) protocol to send and receive transactions between the host application and the CN3 Computer.To set up the IAS, configure a peer-to-peer destination name for the host application. Create a $NGCFGRSP transaction ID that routes to this des-tination name. The IAS uses the transaction ID to route responses from the CN3 back to the host application. $NGCFGRSP is a special transaction ID that the server uses to forward configuration response data from a CN3.All configuration responses are routed with the $NGCFGRSP transaction ID. The IAS cannot track multiple applications sending reader or configu-ration commands. If you have two host applications sending reader or con-figuration commands, they must both be configured to receive the $NGCFGRSP transactions, and receive all CN3 Computer responses.To set up the host computer, verify host computer-to-IAS communication.To set up the application, prepare and write a host application that can communicate with the IAS and send transactions to and receive transac-tions from the CN3 Computer in this format.where:Cg is a TMF Configuration Get response.$+ is the Change Configuration reader command.BV4 means the Beeper Volume configuration command is currently set to a value of 4, which is a very high beeper volume.transaction header TMF field commandstransaction headerA 96-byte field with message number, date, time, source application ID, destinations application ID, transaction ID, and other. Set the system message (SYS$MSG) flag to E in the transaction header.TMF field A 2-byte field containing one of these values:CG Configuration Get request sent from the host application.Cg Configuration Get response sent from the CN3 Computer to the host computer.CS Configuration Set request sent from the host application.Cs Configuration Set response sent from the CN3 Computer to host computercommands The reader and configuration commands to set on the CN3 Computer or the current value to retrieve from the CN3 Computer. To save configuration changes in flash memory, send the .+1 reader com-mand as the last command. See the Command Reference Manual for a list of supported commands.
Chapter 3 —  Configuring the ComputerCN3 Mobile Computer User’s Manual - PRELIMINARY 87Configuring the Color CameraThe 1.3 megapixel color camera (with “flash” light source) is an optional feature that is factory-installed into the upper back of the CN3 Computer, as shown in the following illustration. You can take photos in either high-resolution or a compressed formats, with resolutions up to 800x600 pixels.Using the Pictures & Videos applet, you can take, view, edit pictures, and record and launch video clips stored on your CN3 Computer or on a stor-age card. You can also send pictures and video clips to others, or save an image as the background on the Today screen. Pictures can be viewed indi-vidually, as thumbnails, or as part of a slide show. You can edit your pic-tures by cropping, rotating, and adjusting the brightness and contrast.Images are saved as .JPG files and stored in the “/My Documents/My Pic-tures” default storage location off the root.Watching the image onscreen, move the camera until you get the image you want, then press Enter or tap the screen to save the image.Tap Menu > Options > the Camera tab to configure camera options. While you are in the Pictures & Videos applet, you can select Start > Help for complete information on using the camera.Select Start > Programs > the Pictures & Videos icon, then tap the Cam-era option in the grid or tap Camera in the taskbar.For future use, this is added to your Start menu in the Recent Programs area, via Start > Pictures & Videos.Color Camera
Chapter 3 — Configuring the Computer88 PRELIMINARY - CN3 Mobile Computer User’s ManualConfiguring the SF51 ScannerThe following information pertains to configuring the SF51 Scanner to work with your CN3 Computer. These instructions assume you have the EasySet application installed on your desktop or laptop. The EasySet appli-cation is available from the Intermec Data Capture web site, contact your Intermec representative for information about this application.Imager SettingsDepending on what is selected as the scanner model, image settings, decode security, scanner settings, and virtual wedge are configured from the Inter-mec Settings applet. See the Intermec Computer Command Reference Man-ual, available from the Intermec web site at www.intermec.com, for more information about each enabled option.Bluetooth is required for the SF51 Scanner. On the CN3 Computer, use the Bluetooth applet to enable Bluetooth communications before you con-figure the SF51 Scanner.Creating an SF51 Connection LabelTo initiate a connection from the SF51 Scanner, use your EasySet applica-tion to create an SF51 connection label with the CN3 Bluetooth address. The device address is listed in the Bluetooth applet via the Devices tab on your CN3 Computer.Select Start > Settings > the Communications tab > the Bluetooth icon, check Turn on Bluetooth, then click ok to apply this change.1On your desktop or laptop, double-click the EasySet icon to activate the EasySet application if you have not already done so.2In the left side of the EasySet application, double-click Data transmis-sion settings > Bluetooth parameters > connect/disconnect > compose BT address.
Chapter 3 —  Configuring the ComputerCN3 Mobile Computer User’s Manual - PRELIMINARY 893Enter the Bluetooth address assigned to your CN3 Computer (shown in your Bluetooth applet), then click OK to close this dialog. 4The connection label for the SF51 Scanner appears to the right in the EasySet application, similar to the following. Scan the label once, then confirm the Intermec Ready-To-Work™ indicator (blue light) on the end of the SF51 Scanner starts blinking, which means it is trying to connect. When connected, the indicator assumes a steady blue, then SF51 data gets wedged through the keyboard interface.
Chapter 3 — Configuring the Computer90 PRELIMINARY - CN3 Mobile Computer User’s ManualViewing SF51 Scanner Information from Your CN3 ComputerNote that in the CN3 Computer, the Intermec Settings applet can display up to seven separate SF51 connections. The following illustration shows such connections under the Data Collection option.In this applet, tap Data Collection, then tap (+) to expand the SF51 Scan-ner connections to view MAC addresses, firmware version numbers, and whether each scanner is connected to the CN3 Computer. When you clear (uncheck) Enable scanner port, the SF51 Scanner is disconnected from the CN3 Computer. Check Enable scanner port again to reconnect.If you want to rename these connections to descriptions more suitable for your situation, press the stylus on each SF51 Scanner connection for a pop-up menu, then select Rename. Enter the description, tap ok to save.When the SF51 Scanner is connected, configuration changes take effect immediately. When the SF51 Scanner is not connected, configuration changes take effect once the SF51 Scanner is reconnected.Using Configuration ParametersA configuration parameter changes the way the CN3 Computer operates. Use either of these methods to execute configuration parameters:Scan EasySet bar code labels:Use the EasySet application from Intermec Technologies Corporation to print configuration labels. Scan labels to change imager configuration and data transfer settings. See the EasySet online help for information.Send Reader Commands through the Network or from an ApplicationSee the Intermec Computer Command Reference Manual (P/N: 073529) for more information.
CN3 Mobile Computer User’s Manual - PRELIMINARY 914Maintaining the ComputerUse this chapter to solve problems you may encounter and perform routine maintenance on your CN3 Mobile Computer:
Chapter 4 — Maintaining the Computer92 PRELIMINARY - CN3 Mobile Computer User’s ManualUpgrading the Operating System on your CN3 ComputerYou can use the Intermec Recovery Tools CD to reinstall or upgrade the oper-ating system software on the CN3 Computer. For more information, con-tact your Intermec representative for more information about this CD.You can use the SmartSystems™ Foundation application from Intermec to perform upgrades on your CN3 Computer, versions 2.0 or later. Contact your Intermec representative for more information about the SmartSystems Foundation software.When you upgrade the operating system, you erase the current configura-tion and replace it with the new default configuration. You will need to reset the network parameters on the CN3 Computer to reestablish commu-nications with other devices in the network. In other words, if you upgrade the operating system and the default registry from the operating system has changed, the registry is rolled back to the new default.Troubleshooting Your CN3 Computer•Problems While Operating the CN3 Computer (page 92)•Problems While Configuring the CN3 Computer (page 93)•Problems While Configuring 802.1x Security (page 94)•Problems with Wireless Connectivity (page 93)•Problems While Scanning Bar Codes (page 95)Before sending the CN3 Computer in for service, save its data and configu-ration. Intermec is responsible only for the keypad and hardware features to match the original configuration when doing repairs or replacements.Problems While Operating the CN3 ComputerProblem SolutionYou press I to turn on the CN3 Computer and nothing happens.Make sure the backlight is on by pressing E.Make sure you have a charged CN3 Battery installed cor-rectly. For help, see “Using the Batteries” on page 7.The battery may be discharged. Replace the battery with a spare charged battery, or charge the battery.Perform a clean-boot.The Battery status LED is on. If the battery status LED is a steady green, the battery is more than 95% charged and unit is on a charger.If the battery status LED is blinking red, then the battery is low.If the battery status LED is a steady red, the main battery is on charge.
Chapter 4 —  Maintaining the ComputerCN3 Mobile Computer User’s Manual - PRELIMINARY 93The CN3 Computer appears to be locked up and you cannot enter data.Press I to turn off the CN3 Computer, then press I again to turn on the CN3 Computer.Press and hold I for ten seconds to clean-boot the CN3 Computer.Try reloading the firmware. See “Updating the Sys-tem Software” on page 73.If the CN3 Computer does not boot or reset, contact your local Intermec representative for help.Problems While Configuring the CN3 ComputerProblem SolutionYou scan a configuration command, such as Beeper Vol-ume, and you hear three low beeps.If you are working in the Intermec Settings applet, you cannot scan configuration commands. Exit the applet to scan configuration commands.You scan or enter an option for the Scanner Model con-figuration command and you hear three low beeps.You may have scanned or entered a Scanner Model com-mand that does not apply to the type of scanner that you have installed. Try scanning or entering the Scanner Model command again and select an option for the type of device you are using.You cannot type a character on the keypad or you can only type uppercase or lowercase letters.You may have locked a modifier key on the keypad. Check the CN3 toolbar to see if it contains an icon with a locked symbol. Press the necessary key sequence to unlock the key. See “Using the Keypad” on page 11.Problems with Wireless ConnectivityProblem SolutionWhen you turn on the CN3 Computer after it was sus-pended for a while (10-15 minutes or longer), it can no longer send or receive messages over the network.Host may have deactivated or lost current terminal emu-lation session. In a TCP/IP direct connect network, turn off the “KeepAlive” message from host to maintain the TCP session while a CN3 Computer is suspended.The No Network Connection icon appears on the tool-bar. The CN3 Computer is not communicating with the access point.CN3 Computer is not connected to access point. Ensure access point is turned on and operating. Move closer to access point to reestablish communications. Ensure CN3 Computer is configured correctly for network. CN3 radio parameters must match all access point values (see page 113). If you have an 802.11b/g radio and its radio initialization process failed, reset the CN3 Computer (see page 3).If No Network Connection icon still appears, you may have a defective radio card. For help, contact your local Intermec representative.Problems While Operating the CN3 Computer (continued)Problem Solution
Chapter 4 — Maintaining the Computer94 PRELIMINARY - CN3 Mobile Computer User’s ManualProblems While Configuring 802.1x SecurityIf you have trouble configuring the computer for 802.1x security, check these problems and possible solutions.The CN3 Computer is connected to the Intermec Appli-cation Server or host computer and you move to a new site to collect data. The Network Connection icon was visible, but is now replaced with the No Network Con-nection icon.Move closer to an access point or to a different location to reestablish communications until the Network Connec-tion icon appears. Any data you collected while out of range is transmitted over the network.The Network Connection icon is in the toolbar, but you cannot establish a terminal emulation session with the host computer.There may be a problem with the host computer, with the connection between the Intermec Application Server and the host computer, or with the connection between the access point and the host computer. Check with net-work administrator to make sure the host is running and allowing users to login to the system.The Network Connection icon is in the toolbar, but the host computer is not receiving any data from the CN3 Computer.In a UDP Plus network, there may be a problem with the connection between the Intermec Application Server and the host computer. Check with network administrator or see the user’s manual for the Intermec Application Server.In a TCP/IP network, there may be a problem with the connection between the access point and the host com-puter. Check with network administrator or use your access point user’s manual.Problem SolutionThe CN3 Computer indicates that it is authenticated, but it does not communicate with the host.Ensure CN3 IP address, host IP address, subnet mask, default router are configured for network.The CN3 Computer does not appear to be authenticating and a network connection icon does not appear on the toolbar.CN3 Computer may not be communicating with access point. Ensure CN3 network name matches access point network name (SSID).802.1x security network may not be active. Ensure the server software is properly loaded and configured on server PC. For help, see server software documentation.Problems with Wireless Connectivity (continued)Problem Solution
Chapter 4 —  Maintaining the ComputerCN3 Mobile Computer User’s Manual - PRELIMINARY 95A network connection icon appears in the toolbar, but then disappears.CN3 Computer may not be communicating with the intended access point. Ensure the CN3 network name matches the access point network name. Default network name is “INTERMEC.”Access point may not be communicating with server. Ensure the access point is turned on, properly configured, and has 802.1x security enabled.The CN3 Computer indicates it is not authenticated. User Name and Password parameters on CN3 Computer must match the user name and password on authentica-tion server. You may need to reenter the password on both CN3 Computer and authentication server.On your authentication server, the user and group are allowed and the group policy is allowed to log into the server. For help, see the documentation that shipped with your authentication server software.IP address and secret key for access point must match the IP address and secret key on authentication server. You may need to reenter the IP address and secret key on both your access point and authentication server.Authentication server software is running on server PCYou are setting up multiple access points in a network, with different SSIDs, and the connection fails.CN3 Computer does not save WEP key values when changing the SSID. Reenter the WEP key value after changing the SSID, select Apply Network Settings from the 802.11 Radio menu. You should now be able to con-nect to the different access points.You receive a message saying “The server certificate has expired or your system date is incorrect” after you per-form a clean-boot on the CN3 Computer.Date and time are not saved when a clean-boot is per-formed. Reenter the date and time, then select Apply Network Settings from the 802.11 Radio menu.Problems While Scanning Bar CodesProblem SolutionYou cannot see a red beam of light from the scanner when you press the Scan button and aim the scanner at a bar code label.You may be too far away from the bar code label. Try moving closer to the bar code label and scan it again.You may be scanning the bar code label “straight on.” Change the scanning angle and try again.Move within 2 feet of a wall to test the effective scan of the scanner. For help scanning bar codes, see page 4.When you release the Scan button or handle trigger, the Good Read light does not turn off.The Good Read light will remain on if you configure the CN3 Computer to use continuous/edge triggering. If you configure the CN3 Computer for level triggering and the Good Read light remains on, there may be a problem. Press the Scan button or pull the trigger again without scanning a bar code label. If the light is still on, contact your local Intermec representative.Problem Solution
Chapter 4 — Maintaining the Computer96 PRELIMINARY - CN3 Mobile Computer User’s ManualThe input device attached to the CN3 Computer does not work well or read bar code labels very quickly.Set the Scanner Model command to the specific attached input device. Check enabled bar code symbologies and enable only the symbologies being used.The scanner will not read the bar code label. Aim the scanner beam to cross entire bar code label in one pass. Vary the scanning angle.Check the quality of the bar code label, Scan a bar code label that you know will scan. Compare the two bar code labels to see if the bar code quality is too low. You may need to replace the label that you cannot scan.Ensure the bar code symbology is enabled. Use the Inter-mec Settings applet to check the symbologies. Expand Data Collection > Symbologies beneath devices listed (scanner, virtual wedge) to check and enable symbologies, then scan the bar code label again.Ensure the CN3 application is expecting input from a bar code. You may need to type this information instead.The scanner does not read the bar code labels quickly, or the scanning beam seems to be faint or obscured.The scanner window may be dirty. Clean the window with a solution of ammonia and water. Wipe dry. Do not allow abrasive material to touch the window.You scan a valid bar code label to enter data for your application. The data decoded by the scan module does not match the data encoded in the bar code label.CN3 Computer may have decoded the bar code label in a symbology other than the label’s actual symbology. Try scanning the bar code label again. Make sure you scan the entire label.You receive a message reading “Scanner Communication Failure” when trying to connect a 1551E or 1553 decoded scanner.Make sure you are using the correct cable.Make sure the scanner cable is attached correctly. When you attach the scanner to the port, it should emit a single power up beep.Try enabling the port state using the Intermec Settings applet.Try upgrading the scanner firmware.Select ASCII as the scanner model.Your 1551E or 1553 scanner was working fine, but after changing the port setting you cannot change the configu-ration.1551E or 1553 scanner port must use the correct RS-232 settings to allow configuration in the Intermec Settings applet. Disable, then enable the scanner port state.Configuration settings in the Intermec Settings applet do not match the settings on your 1551E or 1553 Scanner.Disable, then enable the scanner port state to synchronize the CN3 Computer settings with the scanner.Problems While Scanning Bar Codes (continued)Problem Solution
Chapter 4 —  Maintaining the ComputerCN3 Mobile Computer User’s Manual - PRELIMINARY 97Cleaning the Scanner and Camera Windows and ScreenTo keep the CN3 Computer in good working order, you may need to clean the EA11 scanner and color camera windows and the screen.Clean the scanner and camera windows and screen as often as needed for the environment in which you are using the CN3 Computer. To clean the CN3 Computer, use a solution of ammonia and water.Press I to turn off the CN3 Computer. Dip a clean towel or rag in the ammonia solution and wring out the excess. Wipe off the scanner and cam-era windows and screen. Do not allow any abrasive material to touch these surfaces. Wipe dry.CN3 Computer with EA11 ScannerCN3 Computer with Color CameraThere are no user-serviceable parts inside the CN3 Computer. Opening the unit will void the warranty and may cause damage to the internal components.Color Camera
Chapter 4 — Maintaining the Computer98 PRELIMINARY - CN3 Mobile Computer User’s Manual
CN3 Mobile Computer User’s Manual - PRELIMINARY 995Network SupportThis chapter includes information about the different networks supported by the CN3 Mobile Computer, and ways to configure and manage those networks. Note that the CN3 Computer automatically installs the appro-priate software for radio or phone use when the unit is turned on.Note: Desktop icons and applet icons are shown to the left. Any place that Start is mentioned, tap the following Windows icon in the top, left corner of your CN3 desktop.
Chapter 5 — Network Support100 PRELIMINARY - CN3 Mobile Computer User’s ManualPersonal Area Networks“Bluetooth” is the name given to a technology standard using short-range radio links, intended to replace cables connecting portable and fixed elec-tronic devices. The standard defines a uniform structure for a range of devices to communicate with each other with minimal user effort. Its key features are robustness, low complexity, low power, and low cost. The tech-nology offers wireless access to LANs, the mobile phone network, and the internet for a host of home appliances and mobile computer interfaces.Wireless Printing can also be done with Microsoft APIs, including Blue-tooth extensions for Winsock, and Bluetooth virtual COM ports. Informa-tion about other Bluetooth software is in the Bluetooth Resource Kit and the Bluetooth Resource Kit User's Guide via the Intermec Developer Library (IDL), which is available as a download from the Intermec web via www.intermec.com/idl. See your Intermec representative for information.Bluetooth is not started by default after a clean-boot is performed. You can turn on Bluetooth doing either of the following:Wireless ManagerIn the Wireless Manager, either tap All or tap Bluetooth, then wait for “On” to appear beneath the Bluetooth row.Tap Menu > Bluetooth Settings to do device discovery (more information on the next page). Tap Done to close the Wireless Manager.You can use the Wireless Manager to enable and disable Bluetooth, Wi-Fi, and the Phone if it is built into your CN3 Computer.To enable Bluetooth using the Wireless Manager, tap Start > Settings > the Connections tab > the Wireless Manager icon, or tap the Wireless Man-ager row from the Today desktop.
Chapter 5 —  Network SupportCN3 Mobile Computer User’s Manual - PRELIMINARY 101BluetoothThe CN3 Computer retains the Bluetooth state when clean-boots are per-formed, for example:•If Bluetooth is enabled, and a clean-boot was performed, the CN3 Com-puter boots up with the Bluetooth state enabled and Bluetooth virtual COM ports (such as printing) registered. Reactivate the connections manually as the system does not do them.•If Bluetooth is disabled, and a clean-boot was performed, the CN3 Com-puter boots up with Bluetooth disabled. ModeTo turn on Bluetooth, select Start > Settings > the Connections tab > the Bluetooth icon > the Mode tab. Check Turn on Bluetooth, check Make this device visible to other devices, then click ok.DevicesUse this tab to scan for other Bluetooth devices.1Tap  Add new device... to discover (or scan) remote Bluetooth devices.Bluetooth is not started by default after a clean-boot is performed. To run Bluetooth, tap Start > Settings > the Connections tab > the Bluetooth icon.
Chapter 5 — Network Support102 PRELIMINARY - CN3 Mobile Computer User’s Manual2When the CN3 Computer is finished scanning, any newly discovered devices appear in the box. Tap Refresh to do additional discoveries.3Select a device to which to connect, then click Next.4Enter a passkey to establish a secure connection, then tap Next. Tap Yes if prompted to let the other device connect with your CN3 Computer.
Chapter 5 —  Network SupportCN3 Mobile Computer User’s Manual - PRELIMINARY 1035Select what services you want from this remote device, then click Finish to return to the Devices tab.COM PortsUse this page to connect to other devices or allow other devices to connect with your CN3 Computer.1Tap  New Outgoing Port to connection to a Bluetooth device, select the device to add, then click Next.
Chapter 5 — Network Support104 PRELIMINARY - CN3 Mobile Computer User’s Manual2Select a port from the Port drop-down list, check Secure Connection, then click Finish to return to the COM Ports page.3Tap  New Incoming Port to allow other Bluetooth devices to connect with your CN3 Computer, select on which port to secure this connec-tion, then click Finish to return to the COM Ports page.4You can press and hold on a device to either edit that device or delete it from the list.
Chapter 5 —  Network SupportCN3 Mobile Computer User’s Manual - PRELIMINARY 105Wireless PrintingThe Wireless Printing applet separates the task of wireless printing from other Bluetooth management items not relevant to this task.Wireless Printing has a concept of the “current wireless printer.” This printer is the one to which the CN3 Computer makes a connection when the wireless printing COM port is opened. If there is no current wireless printer, there is no wireless printing COM port. Registration and deregis-tration of this COM port is controlled by the Bluetooth COM port con-trol. Use the Wireless Printing applet to handle the COM port registration. Customer software or other test applications can also use this applet to manage the COM port registration and deregistration.The current wireless printer is stored in the registry and is registered and deregistered on Bluetooth stack load/unload. If the current wireless printer changes, the existing wireless printing COM port is deregistered, and the new one is registered instead. The registered COM port is stored in the reg-istry as the “WPort.”For information on using Bluetooth communications, see the Bluetooth Resource Kit in the IDL, which is available as a download from the Inter-mec web site at www.intermec.com/idl. Contact your Intermec representa-tive for more information.Use any of the following methods to set the wireless printer:• Use a Bluetooth device discovery to locate the remote device (page 105)• Manually enter the remote Bluetooth Device Address (page 106)• Use the Current Wireless Printer screen to set a different printer (page 107)SearchTo do a Bluetooth device discovery, do the following:.1Select Start > Settings > the System tab > the Wireless Printing icon.2Clear the Show Printers Only box if you want to discover more than just the Bluetooth printers. Tap Search to initiate the device discovery.
Chapter 5 — Network Support106 PRELIMINARY - CN3 Mobile Computer User’s Manual3In about half a minute, Bluetooth devices discovered within your range will appear. If your preferred printer is in the list, select to highlight the printer, then tap OK. If you do not see your preferred device, make sure this device is powered on and set to discovery, then tap Search again. Tap Cancel to return to the first screen without making changes.ManualIf you know the Bluetooth Device Address of the printer you want to use, do the following to avoid Device Discovery and perform a manual setup.When you set your printer manually, your device may not receive the printer name. Therefore, “-unknown-” can display under Device Name unless you enter the correct value in to the registry in some other way.1Select Start > Settings > the System tab > the Wireless Printing icon.2Tap Manual, enter the address of your device in the field, then tap OK. Tap Cancel to return to the first screen without making changes.
Chapter 5 —  Network SupportCN3 Mobile Computer User’s Manual - PRELIMINARY 107Set Different PrinterTo change your printer, do the following:3Tap either Search or Manual, tap OK., then do the applicable steps. Tap  Cancel to the current wireless printer settings without making changes, then tap Exit to close the applet.Bluetooth AudioFrom the CN3 desktop, select Start > Settings > the System tab > the Blue-tooth Audio icon to access the Bluetooth Audio applet.1Select Start > Settings > the System tab > the Wireless Printing icon.2Tap Set Different Printer to return to the device discovery screen.Use this to discover, activate, and connect to Bluetooth audio devices, such as Bluetooth headsets. You can select a desired audio mode or control the audio volume and microphone gain for the connected Bluetooth headset (if the connected headset has these capabilities).
Chapter 5 — Network Support108 PRELIMINARY - CN3 Mobile Computer User’s ManualDiscovering Bluetooth HeadsetsTo discover a Bluetooth headset with either a “headset” or a “hands-free” profile, tap Search for devices. Discovered audio devices are added to the list with an icon to identify either profile.Connecting to a Bluetooth Headset1Tap a Bluetooth audio device from the list of discovered devices. When a pop-up menu appears and if the device selected was not authenticated during the discovery process, select Authenticate to continue.Note: You can only select one Bluetooth audio device.
Chapter 5 —  Network SupportCN3 Mobile Computer User’s Manual - PRELIMINARY 1092Tap the device name, then select Connect from the pop-up menu. On successful device activation, the device icon changes to remove the red bar from the left connection image.•Tap the Volume slider bar to adjust the volume of the connected Bluetooth audio device.•Tap the Microphone slider bar to adjust the microphone gain of the connected Bluetooth audio device.3If the activated device has a “hands-free” profile, press a button on the device to establish an audio connection between the CN3 and the acti-vated device. See the user manual for the Bluetooth device for information on what button to press.4To establish an audio connection from the CN3 Computer to the acti-vated device with either a “headset” or “hands-free” profile, tap the device name, then select Connect from the menu. When connection is established, the “connected/disconnected” status changes to that of a “connected” status.Configuring Bluetooth Using Intermec SettingsYou can also configure your Bluetooth communications using the Intermec Settings applet. From the CN3 desktop, select Start > Settings > the Sys-tem tab > the Intermec Settings icon. Tap to expand (+) Communications, then Bluetooth to configure its settings.Red bar cleared from connection image
Chapter 5 — Network Support110 PRELIMINARY - CN3 Mobile Computer User’s ManualConnecting with BluetoothMake sure Bluetooth is enabled on your mobile phone. For example, with the Nokia 3650, go to its menu, select Connect > Bluetooth, then set My phone’s visibility to “Shown to all.”Before you connect to the network, make sure Bluetooth is enabled on your CN3 Computer so you can discover and connect to remote devices. Go to “Personal Area Networks” on page 100 for information.Do the following to establish a Bluetooth connection between your CN3 Computer and your mobile phone, then establishing a dial-up networking session with your wireless network. Once connected, you should be able to browse Internet websites and use other online resources.2Enter a name for the connection, such as “Nokia.” In the Select a modem list, select “Bluetooth,” then tap Next to continue.Note: While these instructions apply to many Bluetooth devices, these instructions use the Nokia 3650 for example purposes.1Tap  Start > Settings > the Connections tab > the Connections icon, then tap Add a new modem connection.
Chapter 5 —  Network SupportCN3 Mobile Computer User’s Manual - PRELIMINARY 1113Tap  Add new device... if the phone is not listed in the known devices. Make sure your Bluetooth device is turned on before you start the search.4When the discovery of devices is complete, select your Bluetooth device, then tap Next to continue.5Enter the correct Passkey on both the Bluetooth device and the CN3 Computer, then tap Next to continue.
Chapter 5 — Network Support112 PRELIMINARY - CN3 Mobile Computer User’s Manual6Enter a name for the device if needed, or select what services to use, then tap Finish.7Select the Bluetooth device to use to connect to the network, then tap Next to continue.8Enter the appropriate number as it should be dialed for your Bluetooth connection, then tap Next to continue.
Chapter 5 —  Network SupportCN3 Mobile Computer User’s Manual - PRELIMINARY 1139Enter the user name, password, and domain required for your Bluetooth device, then tap Finish.Now you can establish a connection to your network via the Internet Explorer application. To disconnect, tap the Connectivity icon in the top menu bar, then select Disconnect.Local Area NetworksThe CN3 Computer is a versatile mobile computer that you can add to your wired or wireless data collection network. You can connect your CN3 Computer to your network using either the 802.11b/g radio or the Blue-tooth radio.Configuring 802.11b/g Radio CommunicationsThe wireless CN3 Computer has an internal 802.11b/g radio to transfer data using wireless communications. This section of the manual assumes that you have already set up your wireless communications network includ-ing access points. If you are using a UDP Plus network, you also need to have an Intermec Application Server communicating with a host computer. Your CN3 Computer supports TCP/IP and UDP Plus network protocols. The easiest way to configure the network parameters on the CN3 Com-puter is to use the Intermec Settings applet. See “Intermec Settings Applet” on page 10 for more information.Configuring the Network Parameters for a TCP/IP NetworkIn a TCP/IP network, the CN3 Computer communicates with a host com-puter directly using TCP/IP. The access point acts as a bridge to allow communications between the wired and wireless networks.Configuring the Network Parameters for a UDP Plus NetworkIn a UDP Plus network, the CN3 Computer communications with a host computer through the Intermec Application Server. The Intermec Applica-tion Server translates UDP Plus packets on the wireless network into TCP/IP packets on the wired network and vice versa. The access point acts as a bridge to allow communications between wired and wireless networks.
Chapter 5 — Network Support114 PRELIMINARY - CN3 Mobile Computer User’s ManualPhone Application (GPRS/GSM Radios)With the WAN radio module installed in your CN3 Computer, you can send and receive telephone calls within your Wi-Fi range.Use the speaker on the back of the computer as your earpiece and use the connector on the bottom of the computer for your mouthpiece.ActivationAt factory-default, the phone is disabled. To turn on the phone, use either of the following methods:Wireless ManagerIn the Wireless Manager, either tap All or tap Phone, then wait for “On” to appear beneath the Phone row.Tap Menu > Phone Settings to configure the phone (more information on the next page). Tap Done to close the Wireless Manager.Tap Start > Settings > the Phone desktop icon from the Personal tab or tap Start > Phone to access the application which processes your phone calls. Tap the Close button in the upper right corner of this application to close.You can use the Wireless Manager to enable and disable Bluetooth, Wi-Fi, and the Phone if it is built into your CN3 Computer.To turn on the phone using the Wireless Manager, tap Start > Settings > the Connections tab > the Wireless Manager icon, or tap the Wireless Manager row from the Today desktop.
Chapter 5 —  Network SupportCN3 Mobile Computer User’s Manual - PRELIMINARY 115Phone ApplicationTap the appropriate keys to enter a telephone number, then tap Talk to dial the number.Call HistoryTap  Call History to note the telephone numbers that were previously dialed from this CN3 Computer.Speed DialTap  Speed Dial to select a telephone number with which the CN3 Com-puter is to dial automatically. To add to this list, use the Contacts applica-tion. See “Contacts: Tracking Friends and Colleagues” on page 48 for Tap this to dial the phone number shown above the keypad.Tap this to backspace one digit.Tap this to select a previously dialed number.Tap this to view your previous calls.Tap this to access the Contacts application.Tap this toggle the mute option.Tap this to access the Notes application.
Chapter 5 — Network Support116 PRELIMINARY - CN3 Mobile Computer User’s Manualmore information about the Contacts application.ToolsTap  Tools > Send SMS tab to access the Inbox application and send an SMS (Short Messaging Service) message. Be sure to have an SMS number ready to send the message — this is usually the mobile phone number. See “Messaging: Sending and Receiving E-mail Messages” on page 56 for information about Messaging.Phone Settings•Tap the Phone tab to customize your phone settings such as the ring type and ring tone to use for incoming calls, and the keypad tone to use when entering phone numbers. Tap Other Settings to go to the Sounds Either select Tools > Options from the Phone application or select Start > Settings > the Personal tab > the Phone icon to access the applet.
Chapter 5 —  Network SupportCN3 Mobile Computer User’s Manual - PRELIMINARY 117& Notifications applet.•Tap the Services tab to access settings for any of the provided services.
Chapter 5 — Network Support118 PRELIMINARY - CN3 Mobile Computer User’s ManualTap any of the settings, then tap Get Settings. Make your changes, then tap ok to return to the Settings screen. Below is a sample Settings screen. Tap the Network tab to find, set, or select the type of network on which this phone is to communicate.Remote Access (Modems)You can set up connections to the Internet and corporate network at work to browse the Internet or intranet, send and receive e-mail, and synchronize information using ActiveSync. Connections are made via wireless networks.Your CN3 Computer has two groups of connection settings: My ISP and My Work Network. Use My ISP settings to connect to the Internet. Use My Work Network settings to connect to any private network.• My ISP: Once connected, you can send and receive e-mail messages by using Messaging and view Web or WAP pages by using Internet Explorer Mobile. The communication software for creating an ISP con-nection is already installed on your CN3 Computer. Your service pro-
Chapter 5 —  Network SupportCN3 Mobile Computer User’s Manual - PRELIMINARY 119vider provides the software needed to install other services, such as paging and fax services. If this is the method you want to use, see “Con-necting to an Internet Service Provider” on page 119.• My Work Network: Connect to the network at your company or organi-zation where you work. Once connected, you can send and receive e-mail messages by using Messaging, view Web or WAP pages by using Internet Explorer Mobile, and synchronize with your desktop. If this is the method you want to use, see “Connecting to Work” on page 121.Connecting to an Internet Service ProviderYou can connect to your ISP, and use the connection to send and receive e–mail messages and view Web or WAP pages.Get an ISP dial-up access telephone number, a user name, and a password from your ISP.2Enter a name for the connection, such as “ISP Connection.” If using an external modem connected to your CN3 Computer with a cable, select “Hayes Compatible on COM1” from the Select a modem To view additional information for any screen in the wizard or while changing settings, tap the Help icon.1Tap  Start > Settings > the Connections icon. In My ISP, tap Add a new modem connection.
Chapter 5 — Network Support120 PRELIMINARY - CN3 Mobile Computer User’s Manuallist drop-down, then tap Next to continue.3Enter the access phone number, then tap Next. For more information, tap use dialing rules.4Enter the user name, password, and domain (if provided by an ISP or your network administrator), then tap Finish.5Tap the Advanced tab from the Connections screen, then tap Dialing Rules to specify your current location. These settings apply to all con-
Chapter 5 —  Network SupportCN3 Mobile Computer User’s Manual - PRELIMINARY 121nections. Tap Use dialing rules, tap ok, then tap Edit to continue.6Specify your current phone type. If your phone type is pulse dialing, check Pulse dialing. If your type is tone dialing (as most phone lines are), then clear Pulse dialing. Continue to tap ok to close each page and return to the Settings page.To start the connection, start using one of the following programs. Once connected, you can:• Send and receive e-mail messages by using Messaging. Before you can use Messaging, you need to provide the information it needs to commu-nicate with the e-mail server.• Visit Web and WAP pages by using Internet Explorer Mobile. For more information, see “Internet Explorer Mobile” on page 66.Connecting to WorkIf you have access to a network at work, you can send e-mail messages, view intranet pages, synchronize your CN3 Computer, and possibly access the Internet. Create a modem connection via a RAS (Remote Access Server) account. Before you can create this modem connection, your network Note: To change modem connection settings in My ISP, tap Manage exist-ing connections. Select the desired modem connection, tap Settings, then follow the instructions on the screen.
Chapter 5 — Network Support122 PRELIMINARY - CN3 Mobile Computer User’s Manualadministrator needs to set up a RAS account for you. Your network admin-istrator may also give you Virtual Private Network (VPN) settings.2Enter a name for the connection, such as “Company Connection.” In the Select a modem list, select your modem type, then tap Next to con-tinue. If your modem type does not appear, try reinserting your CN3 Computer into your modem dock.• If using an external modem connected to your CN3 Computer with a cable, select “Hayes Compatible on COM1.”• If using any type of external modem, select the modem by name. If a listing does not exist for your external modem, select “Hayes Compat-ible on COM1.”3Enter the access phone number, using some of the following guidelines. If you know part of the phone number changes frequently as you travel, Note: To change modem connection settings in My Work Network, tap Manage existing connections. Select the desired modem connection, tap Settings, then follow the instructions on the screen.To view additional information for any screen in the wizard or while changing settings, tap the Help icon.1Tap Start > Settings > the Connections icon. In My Work Network, tap Add a new modem connection.
Chapter 5 —  Network SupportCN3 Mobile Computer User’s Manual - PRELIMINARY 123create dialing rules to avoid creating numerous modem connections for the same phone number. For more information, tap use dialing rules.• Enter the phone number exactly as you want it dialed. For example, if you call from a business complex or hotel that requires a nine before dialing out, enter “9” in front of the phone number.• Enter the APN provided by your mobile phone service provider.• When using dialing rules, phone numbers are entered differently. To use additional numbers, such as a “9” to dial from an office complex or hotel, you must use additional dialing rules or change dialing pat-terns. See “Create Dialing Rules” via your online help for informa-tion.aIn Country/Region code, enter the appropriate code when dialing internationally. For more information, contact an operator at your local phone company.bIn Area code, enter the area code, if needed.cEnter the Phone Number, then tap Next to continue.4Enter the user name, password, and domain (if provided by an ISP or your network administrator). If a domain name was not provided, try the connection without entering a domain name. Tap Finish.
Chapter 5 — Network Support124 PRELIMINARY - CN3 Mobile Computer User’s ManualCreating a VPN Server Connection to WorkA VPN connection helps you to securely connect to servers, such as a cor-porate network, via the Internet. Ask your network administrator for the following: user name, password, domain name, TCP/IP settings, and host name or IP address of the VPN server2In Name, enter a name for the connection, such as a company’s name. In Host name/ IP, enter the VPN server name or IP address. Next to VPN type, select the type of authentication to use with your device: “IPSec/L2TP” or “PPTP.” If you are not sure which option to choose, ask your network administrator. Tap Next to continue.To view additional information for any screen in the wizard or while changing settings, tap the Help icon.Note: To change existing settings in My Work Network, tap Manage exist-ing connections > the VPN tab. Select the desired VPN connection, tap Settings, then follow the instructions on the screen.1Tap  Start > Settings > the Connections icon. In My Work Network, tap Add a new VPN server connection.
Chapter 5 —  Network SupportCN3 Mobile Computer User’s Manual - PRELIMINARY 1253Select the type of authentication. If you select A pre-shared key, enter the key provided by your network administrator.4Enter your user name, password, and domain name as provided by your ISP or network administrator, then tap Finish. If a domain name was not provided, try the connection without entering a domain name.Insert necessary equipment, such as a network card, into the CN3 Com-puter, and use a desired program to begin connecting.Ending a Connection• When connected via cable or cradle, detach your CN3 Computer.• When connected via Infrared, move the CN3 Computer away from the other computer or device.• When connected via a wireless network, switch off the connection.• When connected via modem or VPN, tap the Connectivity icon on the top, then tap Disconnect.
Chapter 5 — Network Support126 PRELIMINARY - CN3 Mobile Computer User’s ManualiConnectThe default network adapter or radio is dependent on what radios are installed in your CN3 Computer. With the iConnect menu, using the Enable feature, you can specify “Wireless” or “No Networking” to load onto your CN3 Computer when a cold-boot is performed. If you had specified a network prior to when a warm-boot is performed on the CN3 Computer, the iConnect application restores your network inter-faces to what they were before the warm-boot was performed.See the Developer’s Support area of the Intermec web site for the latest information on network adapters for your unit.Select Dismiss from the iConnect menu to end the session without exiting the application.Select Exit iConnect to exit the application. To access the iConnect application after you have exited it, perform a warm-boot on the CN3 Computer. The iConnect icon then reappears above the command bar.No NetworkingIf you do not need any networking interface, select Enable > No Network-ing from the iConnect menu. The Wireless radio tower icon is replaced with one that shows an “X,” a check mark appears next to the “No Net-working” option in the menu, and the iConnect application disables all other networking interfaces.Wireless CommunicationsTo enable wireless communications on the CN3 Computer, select Enable > Wireless from the iConnect menu. The Wireless icon (shaped like a radio tower) appears in the toolbar, a check mark appears next to the “Wireless” option in the menu, and wireless communications is enabled.To configure wireless communications on the CN3 Computer, select Tools > Wireless Settings from the iConnect menu to access the Profile Wizard for the 802.11b/g radio module.To access the iConnect menu, tap the iConnect icon (shown to the left) above your command bar for the following menu:You can configure wireless 802.11b/g communications through the applet. Tap  Start > Settings > the System tab > the Wireless Network icon to access the Profile Wizard. Go to “Configuring Microsoft Security” on page 148 for information.
Chapter 5 —  Network SupportCN3 Mobile Computer User’s Manual - PRELIMINARY 127To view information about the Wireless 802.11b/g communications, select Tools > Wireless IP Settings from the iConnect menu for the following:To view the status of the Wireless communications, select Status > Wire-less from the iConnect menu to view the status. Tap Try Again to check the status after you make changes to the connection.Ping TestSelect To o l s  > Ping Test from the iConnect menu to test the connection of your CN3 Computer against your network. If you want to ping your gate-way or DHCP server, select Ping my gateway or DHCP server, then select which to ping from the top drop-down list. If you want to ping a specific host, select Ping the host address below, then enter its IP address in the field beneath. After you make your selection, tap Ping! and wait for results.
Chapter 5 — Network Support128 PRELIMINARY - CN3 Mobile Computer User’s ManualConfiguring SecurityUse the next sections to understand how to configure each type of security on your wireless CN3 Computer.The CN3 Computer provides three types of security for your wireless net-work: Wi-Fi Protected Access 2 (WPA2/802.11i), WPA, and WEP.   802.1x should be referred to as an authentication method used for WPA and WPA2. Another authentication method for WPA and WPA2 would be the Pre-Shared Key (PSK).By default, Funk security is enabled. You must use either Microsoft or Funk security to implement your security solution. Go to page 130 for more information.Loading CertificatesIf you choose to use Transport Layer Security (TLS) with WPA or 802.1x security, you need to have a unique client certificate on the CN3 Computer and a trusted root certificate authority (CA) certificate. If you choose to use PEAP, you need to load a root CA certificate. You can use a third-party CA to issue unique client certificates and a root certificate.Wireless NetworkYour wireless adapter (network interface card) connects to wireless net-works of two types: infrastructure networks and ad-hoc networks.• Infrastructure networks get you onto your corporate network and the internet. Using the 802.11b/g infrastructure mode, the CN3 Computer establishes a wireless connection to an access point, linking you to the rest of the network.• Ad-hoc networks are private networks shared between two or more cli-ents, even with no access point.If your CA is on your WLAN, select Start > Settings > the System tab > the Certificates icon > the Root tab to view certificate details. To remove a cer-tificate, press and hold a certificate, then select Delete.
Chapter 5 —  Network SupportCN3 Mobile Computer User’s Manual - PRELIMINARY 129Each wireless network is assigned a name (or Service Set Identifier - SSID) to allow multiple networks to exist in the same area without infringement.Intermec recommends using security measures with wireless networks to prevent unauthorized access to your network and to ensure your privacy of transmitted data. Authentication (cryptographically protected) by both the network and the user, transmitted data, and encryption are required ele-ments for secure networks. There are schemes available for implementing these features.EncryptionAES (Advanced Encryption Stan-dard)A block cipher, a type of symmetric key cipher that uses groups of bits of a fixed length - called blocks. A symmetric key cipher is a cipher using the same key for both encryption and decryption.As implemented for wireless, this is also known as CCMP, which implements AES as TKIP and WEP are implementations of RC4.CKIP (Cisco Key Integrity Proto-col)This is Cisco's version of the TKIP protocol, compatible with Cisco Aironet products.TKIP (Temporal Key Integrity Protocol)This protocol is part of the IEEE 802.11i encryption standard for wireless LANs., which provides per-packet key mixing, a message integrity check and a re-keying mechanism, thus overcoming most of the weak points of WEP. This encryption is more difficult to crack than the standard WEP. Weak points of WEP include: No Initiation Vector (IV) reuse protection, weak keys, no protec-tion against message replay, no detection of message tampering, and no key updates.WEP (Wired Equivalent Privacy) encryptionWith preconfigured WEP, both the client CN3 Computer and access point are assigned the same key, which can encrypt all data between the two devices. WEP keys also authenticate the CN3 Computer to the access point - unless the CN3 Computer can prove it knows the WEP key, it is not allowed onto the network. WEP keys are only needed if they are expected by your clients. There are two types available: 64-bit (5-character strings, 12345) (default) and 128-bit (13-character strings, 1234567890123). Enter these as either ASCII (12345) or Hex (0x3132333435).Key Management ProtocolsWPA (Wi-Fi Protected Access) This is an enhanced version of WEP that does not rely on a static, shared key. It encompasses a number of security enhancements over WEP, including improved data encryption via TKIP and 802.11b/g authentication with EAP. WiFi Alli-ance security standard is designed to work with existing 802.11 products and to offer forward compatibility with 802.11i.WPA2 (Wi-Fi Protected Access) Second generation of WPA security. Like WPA, WPA2 provides enterprise and home Wi-Fi users with a high level of assurance that their data remains protected and that only authorized users can access their wireless networks. WPA2 is based on the final IEEE 802.11i amendment to the 802.11 standard ratified in June 2004. WPA2 uses the Advanced Encryption Standard (AES) for data encryption and is eligible for FIPS (Federal Information Processing Standards) 140-2 com-pliance.
Chapter 5 — Network Support130 PRELIMINARY - CN3 Mobile Computer User’s ManualChoosing Between Microsoft and Funk SecurityBefore you can implement a security solution on the CN3 Computer, you need to choose between Microsoft and Funk security:• By default, Funk security is enabled. It provides everything you get with Microsoft security plus the addition of Cisco Compatible Extensions fea-tures. It also provides additional authentication types like EAP-TTLS, LEAP, and EAP-FAST. If you want to use Funk security, you can start-ing configuring your security now. Information starts on the next page.• If you want to use Microsoft security, you need to select Microsoft secu-rity as your security choice before you can do configurations. Go to “Configuring Microsoft Security” on page 148 to begin.AuthenticationEAP (Extensible Authentication Protocol)802.11b/g uses this protocol to perform authentication. This is not necessarily an authentication mechanism, but is a common framework for transporting actual authentication protocols. Intermec provides a number of EAP protocols for you to choose the best for your network.EAP-FAST (Flexible Authentica-tion via Secure Tunneling)A publicly accessible IEEE 802.1X EAP type developed by Cisco Systems. It is available as an IETF informational draft. An 802.1X EAP type that does not require digital certificates, supports a variety of user and password database types, supports password expiration and change, and is flexible, easy to deploy, and easy to manage.LEAP (Lightweight Extensible Authentication Protocol)Also known as Cisco-Wireless EAP, provides username/password based authenti-cation between a wireless client and a RADIUS server. In the 802.1x framework, traffic cannot pass through a wireless network access point until it successfully authenticates itself.EAP-PEAP (Protected Extensible Authentication Protocol)Performs secure authentication against Windows domains and directory services. It is comparable to EAP-TTLS both in its method of operation and its security, though not as flexible. This does not support the range of inside-the-tunnel authentication methods supported by EAP-TTLS. Microsoft and Cisco both support this protocol.EAP-TLS (Transport Layer Secu-rity)Based on the TLS (Transport Layer Security) protocol widely used to secure web sites. This requires both the user and authentication server have certificates for mutual authentication. While cryptically strong, this requires corporations that deploy this to maintain a certificate infrastructure for all their users.EAP-TTLS (Tunneled Transport Layer Security) This protocol provides authentication like EAP-TLS (see page 141) but does not require certificates for every user. Instead, authentication servers are issued certificates. User authentication is done using a password or other credentials that are transported in a securely encrypted “tunnel” established using server certifi-cates.EAP-TTLS works by creating a secure, encrypted tunnel through which you present your credentials to the authentication server. Thus, inside EAP-TTLS there is another inner authentication protocol that you must configure via Addi-tional TTLS Settings.Note: Your security choice does not depend on your authentication server. For example, you can choose Funk security if you use Microsoft Active Directory® to issue certificates.
Chapter 5 —  Network SupportCN3 Mobile Computer User’s Manual - PRELIMINARY 131Configuring Funk SecurityYou can define up to four profiles for your Funk Odyssey security. Differ-ent profiles let your CN3 Computer communicate in different networks without having to change all of your security settings. For example, you can set up one profile for the manufacturing floor and one for the warehouse.Using WPA SecurityWi-Fi Protected Access (WPA) is a strongly enhanced, interoperable Wi-Fi security that addresses many of the vulnerabilities of Wired Equivalent Pri-vacy (WEP). Instead of WEP, WPA uses Temporal Key Integrity Protocol (TKIP) for its data encryption method. Currently, WPA satisfies IEEE 802.11i standards.WPA runs in Enterprise (802.1x) mode or PSK mode:• In Enterprise mode, WPA provides user authentication using 802.1x and the Extensible Authentication Protocol (EAP). That is, an authentication server (such as a RADIUS server) must authenticate each device before the device can communicate with the wireless network.• In PSK mode, WPA provides user authentication using a shared key between the authenticator and the CN3 Computer. WPA-PSK is a good solution for small offices or home offices that do not want to use an authentication server.To use WPA security, you need an access point with an 802.11b/g radio that supports WPA.1Select Start > Settings > the System tab > the Intermec Settings icon.2Tap (+) to expand Communications > 802.11 Radio > Funk Security.3Select an active profile, then configure its security settings.
Chapter 5 — Network Support132 PRELIMINARY - CN3 Mobile Computer User’s ManualConfiguring WPA Security With Funk SecurityUse this procedure to set WPA security with Funk security.1Make sure you have configured the communications and radio parame-ters on your CN3 Computer and that Funk is your security choice.2Open Intermec Settings. Tap (+) to expand Communications > 802.11 Radio > Funk Security > Profile X with “X” being “1” through “4.”3For Association, select “WPA” and press Enter.4For 8021x, select “PEAP,” “TLS,” “TTLS,” “LEAP,” or “EAP-FAST” and press Enter.If you select “TTLS” or “PEAP:”aSelect User Name, type your user name, then press Enter.bSelect User Password, type a user password, then press Enter.cFor Validate Server Certificate, select “Yes,” then press Enter. Note that you must have the date on the CN3 Computer set correctly when you enable Validate Server Certificate.dYou must enter a User Name and Subject Name. You can also enter a Server 1 Common name or Server 2 Common name if you want to increase your level of security.If you select “TLS:”aLoad a user and root certificate on your CN3 Computer. For help, see “Loading Certificates” on page 128.bFor Validate Server Certificate, select “Yes,” then press Enter. Note that you must have the date on the CN3 Computer set correctly when you enable Validate Server Certificate.cYou must enter a User Name and Subject Name. You can also enter a Server 1 Common name or Server 2 Common name if you want to increase your level of security.
Chapter 5 —  Network SupportCN3 Mobile Computer User’s Manual - PRELIMINARY 133If you select “LEAP” or “EAP-FAST:”aSelect User Name, type your user name, then press Enter.bSelect User Password, type a user password, then press Enter.6Exit the Intermec Settings applet.Configuring WPA-PSK Security With Funk SecurityUse this procedure to set WPA-PSK security on your CN3 Computer with Funk security.1Make sure you have configured the communications and radio parame-ters on your CN3 Computer and that Funk is your security choice.2Open Intermec Settings. Tap (+) to expand Communications > 802.11 Radio > Funk Security > Profile X with “X” being “1” through “4.”3For Association, select “WPA” and press Enter.4For 8021x, select “None” and press Enter.5For Pre-Shared Key, enter the pre-shared key or the passphrase.The pre-shared key must be a value of 32 hex pairs preceded by 0x for a total of 66 characters. The value must match the key value on the access point. The passphrase must be from 8 to 63 chtomaracters. After you enter a passphrase, the CN3 Computer internally converts it to a pre-shared key. This value must match the passphrase on the authenticator.6Exit the Intermec Settings applet.Using 802.1x Authentication802.1x authentication provides centralized user authentication using an authentication server, authenticators (access points), and supplicants. These components communicate using an EAP authentication type, such as TLS (Transport Layer Security) or PEAP (Protected Extensible Authentication Protocol). 802.1x security provides data encryption using dynamic WEP key management. To use 802.1x security, you need:• An access point with an 802.11b/g radio.• A CN3 Computer with an 802.11b/g radio and the 802.1x/WPA secu-rity option.
Chapter 5 — Network Support134 PRELIMINARY - CN3 Mobile Computer User’s ManualConfiguring 802.1x Security With Funk SecurityUse this procedure to set 802.1x security on your CN3 Computer with Funk security.1Make sure you have configured the communications and radio parame-ters on your CN3 Computer and that Funk is your security choice.2Open Intermec Settings. Tap (+) to expand Communications > 802.11 Radio > Funk Security > Profile X with “X” being “1” through “4.”3For Association, select “Open” and press Enter. When working with Cisco Aironet access points, you can select “Network-EAP.”4For Encryption, select “WEP” and press Enter.5For 8021x, select “PEAP,” “TLS,” “TTLS,” “LEAP,” or “EAP-FAST” and press Enter.If you select “TTLS” or “PEAP:”aSelect User Name, type your user name, then press Enter.bSelect User Password, type a user password, then press Enter.cFor Validate Server Certificate, select “Yes,” then press Enter. Note that you must have the date on the CN3 Computer set correctly when you enable Validate Server Certificate.dYou must enter a User Name and Subject Name. You can also enter a Server 1 Common name or Server 2 Common name if you want to increase your level of security.If you select “TLS:”aLoad a user and root certificate on your CN3 Computer (page 128).bFor Validate Server Certificate, select “Yes,” then press Enter. Note that you must have the date on the CN3 Computer set correctly when you enable Validate Server Certificate.cYou must enter a User Name and Subject Name. You can also enter a Server 1 Common name or Server 2 Common name if you want to increase your level of security.
Chapter 5 —  Network SupportCN3 Mobile Computer User’s Manual - PRELIMINARY 135If you select “LEAP” or “EAP-FAST:”aSelect User Name, type your user name, then press Enter.bSelect User Password, type a user password, then press Enter.7Exit the Intermec Settings applet.Using Static WEP SecurityThe CN3 Computer uses the Wired Equivalent Privacy (WEP) protocol to add security to your wireless network based on the 802.11b/g standard. To use WEP security, you need an access point with an 802.11b/g radio.Configuring Static WEP Security With Funk SecurityUse this procedure to set Static WEP security with Funk security.1Make sure you have configured the communications and radio parame-ters on your CN3 Computer and that Funk is your security choice.2Open Intermec Settings. Tap (+) to expand Communications > 802.11 Radio > Funk Security > Profile X with “X” being “1” through “4.”.3For Association, select “Open” and press Enter. 4For Encryption, select “WEP” and press Enter.5For 8021x, select “None” and press Enter.7For Transmit key, select which WEP key to use for encryption of trans-mitted data.8Define a value for each key, up to four. Enter an ASCII key or a hex key either 5 or 13 bytes long based on the radio capability. Set a 5-byte value for 64-bit WEP or a 13-byte value for 128-bit WEP. Precede hex keys with 0x and make sure the keys use 5 or 13 hex pairs.9Exit the Intermec Settings applet.Using the Profile WizardTo start 802.11b/g communications on the CN3 Computer, tap Start > Settings > the System tab > the Wireless Network icon to access the Pro-file Wizard for the 802.11b/g radio module.
Chapter 5 — Network Support136 PRELIMINARY - CN3 Mobile Computer User’s ManualA profile contains all the information necessary to authenticate you to the network, such as login name, password or certificate, and protocols by which you are authenticated.You can have up to four profiles for different networks. For example, you may have different login names or passwords on different networks, or you may use a password on one network, and a certificate on another.Use the Profiles page to select and configure between the networking envi-ronments assigned to this 802.11b/g radio.BasicUse the Basic page to set the network type, name, and manage battery power for this profile. Tap ok to return to the Profiles page.Profile Tap the drop-down list to choose between four different profiles assigned to this unit, then tap Edit Select Profile, make the changes needed for this profile (starting on the next page), then tap ok to return to the Profiles page.Enable Microsoft's Wireless Zero ConfigCheck this to enable Microsoft's Wireless Zero Config application and disable the Intermec software solution for 802.11b/g, including configuration via the Wireless Network applet.
Chapter 5 —  Network SupportCN3 Mobile Computer User’s Manual - PRELIMINARY 137SecurityThe following are available from the 8021x Security drop-down list: None, PEAP (page 139), TLS (page 141), TTLS (page 142), LEAP (page 145), and EAP-FAST (page 146).NoneUse “None” to disable 802.1x security and enable WEP encryption. Set 8021x Security as “None,” Association to “Open,” and Encryption to “None.”To enable WEP encryption:1Set 8021x Security as “None” and Association to “Open” or “Shared” as required to match the settings in your access point. Note “Open” is the recommended choice as “Shared” key authentication has security weaknesses.2Set Encryption to “WEP.”Profile Label Enter a unique name for your profile.Network type Tap the list to select “Infrastructure” if the network uses access points to connect to the corporate network or internet; or “Ad-Hoc” to set up a private network with one or more participants.Channel If you select “Ad-Hoc” for the network type, select the channel on which you are communicating with others in your network. There are up to 11 channels available.SSID (Net-work Name)This assumes the profile name unless another name is entered in this field. If you want to connect to the next available network or are not familiar with the network name, enter “ANY" in this field. Consult your LAN administrator for network names.Enable Power Management:Check this box to conserve battery power (default), or clear this box to disable this feature.
Chapter 5 — Network Support138 PRELIMINARY - CN3 Mobile Computer User’s Manual3Select a data transmission key from the Data TX Key drop-down list near the bottom of this screen.4Enter an ASCII key or a hex key either 5 or 13 bytes long based on the radio capability in the appropriate Key # field. Set a 5-byte value for 64-bit WEP or a 13-byte value for 128-bit WEP. Precede hex keys with 0x and make sure the keys use 5 or 13 hex pairs.To enable WPA encryption using a pre-shared key:1Set 8021x Security as “None.”2Set Association to “WPA.”3Enter the passphrase as ASCII (12345) in the Pre-Shared Key field.To enable WPA2 encryption using a preshared key:1Set 8021x Security as “None.”2Set Association to “WPA2.”3Set Encryption to either “TKIP” or “AES.”
Chapter 5 —  Network SupportCN3 Mobile Computer User’s Manual - PRELIMINARY 1394Enter the passphrase as ASCII (12345) in the Pre-Shared Key field.PEAP (Protected EAP)This protocol performs secure authentication against Windows domains and directory services. It is comparable to EAP-TTLS (see page 142), both in its method of operation and its security, though not as flexible. This does not support the range of inside-the-tunnel authentication methods sup-ported by EAP-TTLS. Microsoft and Cisco both support this protocol.Use “PEAP” to configure the use of PEAP as an authentication protocol and to select “Open,” “WPA,” “WPA2,” or “Network EAP” as an associa-tion mode.1Set 8021x Security as “PEAP,” then choose any of the following:•Set Association to “Open.”•Set Association to “WPA.”•Set Association to “WPA2” and Encryption to either “TKIP” or “AES.”•Set Association to “Network EAP” and Encryption to either “WEP” or “CKIP.”2Enter your unique Username and password to use this protocol.3Select Prompt for password to have the user enter this password each time to access the protocol; or leave Use following password as selected and enter your unique password to use the protocol without entering a password each time you use your CN3 Computer.4Tap  Get Certificates to obtain or import server certificates. See page 144.
Chapter 5 — Network Support140 PRELIMINARY - CN3 Mobile Computer User’s Manual5Tap  Additional Settings to assign an inner PEAP authentication and set options for server certificate validation and trust.Additional PEAP Settings1Select an authentication method from the Inner PEAP Authentication drop-down list.2Check Validate Server Certificate to verify the identity of the authenti-cation server based on its certificate when using PEAP.3Tap  Root CA, select a root certificate, then OK to return to the Inner PEAP Authentication.4Enter the Common Names of trusted servers. Note that if these fields are left blank, the client will accept any authentication server with a valid certif-icate. For increased security, you should specify exactly which authentication servers you expect to use.5Tap  ok to return to the Security page.EAP/MS-CHAP-V2 Authenticates against a Windows Domain Controller and other non-Windows user data-bases. This is Microsoft's implementation of PEAP.EAP/Token Card Use with token cards. The password value entered is never cached. This is Cisco's imple-mentation of PEAP.EAP/MD5-Challenge Message Digest 5. A secure hashing authentication algorithm.
Chapter 5 —  Network SupportCN3 Mobile Computer User’s Manual - PRELIMINARY 141TLS (EAP-TLS)EAP-TLS is a protocol that is based on the TLS (Transport Layer Security) protocol widely used to secure web sites. This requires both the user and authentication server have certificates for mutual authentication. While cryptically strong, this requires corporations that deploy this to maintain a certificate infrastructure for all their users.Use “TLS” to configure using EAP-TLS as an authentication protocol, pick “Open,” “WPA,” “WPA2,” or “Network EAP” as an association mode.1Set 8021x Security as “TLS, then choose any of the following:•Set Association to “Open.”•Set Association to “WPA.”•Set Association to “WPA2” and Encryption to either “TKIP” or “AES.”•Set Association to “Network EAP” and Encryption to either “WEP” or “CKIP.”2Enter your unique Subject Name and User Name of the corresponding certificate installed on your CN3 Computer to use this protocol.3Tap  Get Certificates to obtain or import server certificates. See page 144.4Tap  Additional Settings to set options for server certificate validation and trust.Additional TLS Settings1Check Validate Server Certificate to verify the identity of the authenti-cation server based on its certificate when using TLS.2Tap Root CA, select a root certificate, then tap OK to return to the TLS settings.3Enter the Common Names of trusted servers. Note that if these fields are left blank, the client will accept any authentication server with a valid certif-icate. For increased security, you should specify exactly which authentication servers you expect to use.
Chapter 5 — Network Support142 PRELIMINARY - CN3 Mobile Computer User’s Manual4Tap  ok to return to the Security page.TTLS (EAP-Tunneled TLS)This protocol provides authentication like EAP-TLS (see page 141) but does not require user certificates. User authentication is done using a pass-word or other credentials that are transported in a securely encrypted “tun-nel” established using server certificates.EAP-TTLS works by creating a secure, encrypted tunnel through which you present your credentials to the authentication server. Thus, inside EAP-TTLS there is another inner authentication protocol that you must configure via Additional TTLS Settings.Use “TTLS” to configure EAP-TTLS as an authentication protocol, select “Open,” “WPA,” “WPA2,” or “Network EAP” as an association mode.1Set 8021x Security as “TTLS,” then choose one of the following:•Set Association to “Open.” (default configuration)•Set Association to “WPA.”•Set Association to “WPA2” and Encryption to either “TKIP” or “AES.”•Set Association to “Network EAP” and Encryption to either “WEP” or “CKIP.”2Enter your unique Username to use this protocol.3Select Prompt for password to have the user enter this password each time to access the protocol, or leave Use following password as selected and enter your unique password to use the protocol without entering a password each time you use your CN3 Computer.4Tap  Get Certificates to obtain or import server certificates (see page 144).
Chapter 5 —  Network SupportCN3 Mobile Computer User’s Manual - PRELIMINARY 1435Tap  Additional Settings to assign an inner TTLS authentication and an inner EAP, and set the server certificate validation and trust.Additional TTLS Settings1Select an authentication method from the Inner TTLS Authentication drop-down list.2If you select “EAP” for the inner authentication protocol, then select an inner EAP protocol from the Inner EAP drop-down list.3Enter the Common Names of trusted servers. Note that if these fields are left blank, the client will accept any authentication server with a valid certif-icate. For increased security, you should specify exactly which authentication servers you expect to use.Check Validate Server Certificate to verify the identity of the authenti-cation server based on its certificate when using TTLS.4Tap  Root CA, select a root certificate, then tap OK to return to the Inner TTLS Authentication.5Enter the Anonymous EAP-TTLS Name as assigned for public usage. Use of this outer identity protects your login name or identity.PAP Password Authentication Protocol. A simple authentication protocol that sends security information in the clear.CHAP Challenge Handshake Authentication Protocol. Use of Radius to authenticate a termi-nal without sending security data in the clear. Authenticates against non-Windows user databases. You cannot use this if authenticating against a Windows NT Domain or Active Directory.MS-CHAP; MS-CHAP-V2 Authenticates against a Windows Domain Controller and other non-Windows user databases.PAP/Token Card Use with token cards. The password value entered is never cached.EAP Extensible Authentication Protocol
Chapter 5 — Network Support144 PRELIMINARY - CN3 Mobile Computer User’s Manual6Tap  ok to return to the Security page.Get CertificatesCertificates are pieces of cryptographic data that guarantee a public key is associated with a private key. They contain a public key and the entity name that owns the key. Each certificate is issued by a certificate authority.Use this page to import a certificate onto the CN3 Computer.Root Certificates1Tap the <<< button next to the Import Root Certificate field to select the root certificate (DER-encoded .CER file) to import.2Click Import Root Cert to install the selected certificate.User Certificate1Tap the <<< button next to the Certificate Path (.cer) field to select the user certificate (DER-encoded .CER file without the private key) to import.2Tap the <<< button next to the Key Path (.pvk) field to select the private key (.PVK file) which corresponds to the user certificate chosen in step 1.3Tap  Import User Cert to install the selected certificate.Web EnrollmentTap  Web Enrollment to obtain a user certificate over the network from an IAS Server.
Chapter 5 —  Network SupportCN3 Mobile Computer User’s Manual - PRELIMINARY 145Tap  ok to return to the Security page.LEAP (Cisco Lightweight EAP)LEAP is the Cisco Lightweight version of EAP.Use “LEAP” to configure the use of LEAP as an authentication protocol, select “Open,” “WPA,” “WPA2,” or “Network EAP” as an association mode, or assign “Network EAP.” Note that this defaults to the Network EAP.1Set 8021x Security as “LEAP,” then choose one of the following:•Set Association to “Open.”•Set Association to “WPA.”•Set Association to “WPA2” and Encryption to either “TKIP” or “AES.”•Set Association to “Network EAP” and Encryption to either “WEP” or “CKIP.”2Enter your unique Username to use this protocol.3Select Prompt for password to have the user enter this password each time to access the protocol, or leave Use following password as selected and enter your unique password to use the protocol without entering a password each time you use your CN3 Computer.
Chapter 5 — Network Support146 PRELIMINARY - CN3 Mobile Computer User’s ManualEAP-FAST (EAP-Flexible Authentication via Secured Tunnel)The EAP-FAST protocol is a client-server security architecture that encrypts EAP transactions with a TLS tunnel. While similar to PEAP, it differs significantly as EAP-FAST tunnel establishment is based on strong secrets unique to users. These secrets are called Protected Access Credentials (PACs), which CiscoSecure ACS generates using a master key known only to CiscoSecure ACS. Because handshakes based upon shared secrets are intrinsically faster than handshakes based upon PKI, EAP-FAST is the sig-nificantly faster of the two solutions that provide encrypted EAP transac-tions. No certificate management is required to implement EAP-FAST.Use “EAP-FAST” to configure the use of EAP-FAST as an authentication protocol, select “Open,” “WPA,” “Network EAP” as an association mode.1Set 8021x Security as “EAP-FAST,” then choose one of the following:•Set Association to “Open.”•Set Association to “WPA.”•Set Association to “WPA2.”•Set Association to “Network EAP” and Encryption to either “WEP” or “CKIP.”2Enter your unique Username to use this protocol.3Select Prompt for password to have the user enter this password each time to access the protocol, or leave Use following password as selected and enter your unique password to use the protocol without entering a password each time you use your CN3 Computer.4Tap  Additional Settings to set options for PAC management and assign an anonymous EAP-FAST name.Additional Settings1Tap  PAC Manager to view the PAC files currently installed on your CN3 Computer. Tap ok to return to the Additional Settings screen.2If you already have a PAC on your CN3 Computer, clear Allow Auto-matic PAC provisioning to avoid receiving additional PACs from the server.
Chapter 5 —  Network SupportCN3 Mobile Computer User’s Manual - PRELIMINARY 1473If Allow Automatic PAC provisioning is checked, you can check:•Prompt before acquiring a new PAC for notification of any incom-ing PACs.•Prompt before replacing a PAC for notification whether to replace a current PAC with an incoming PAC.4Enter the Anonymous EAP-FAST Name as assigned for public usage. This outer identity protects your login name or identity.5Click ok to return to the Security page.AdvancedUse this page to configure additional settings for this profile.•Detect Rogue APs:Wireless NICs and APs associate based on the SSID configured for the NIC. Given an SSID, the BSSID with the strongest signal is often cho-sen for association. After association, 802.1x authentication may occur and during authentication credentials to uniquely identify a user - these are passed between the NIC and the AP.The base 802.1x technology does not protect the network from “rogue APs.” These can mimic a legitimate AP to authentication protocols and user credentials. This provides illegal users ways to mimic legitimate users and steal network resources and compromise security.
Chapter 5 — Network Support148 PRELIMINARY - CN3 Mobile Computer User’s ManualCheck this box to detect and report client behavior suspected of being rogue APs. Once a rouge AP is detected, your CN3 Computer no longer associates with that AP until you perform a clean boot.Clear this box to solve AP connection problems that result when an AP gets put on the rogue AP list due to inadvertent failed authentications and not because it is a real rouge.•Enable mixed cell:Mixed cell is a profile-dependent setting. If enabled, using WEP, you can connect to access points that allow the optional use of encryption.•Allow fast roaming (CCKM):When using a wireless LAN that uses Cisco Access Points, a LEAP-enabled client device can roam from one access point to another without involving the authentication (RADIUS) server. If enabled, an access point configured to provide Wireless Domain Services (WDS) takes the place of the RADIUS server (caching credentials of an initial authentica-tion with the RADIUS server) and authenticates the client without per-ceptible delay in voice or other time-sensitive applications.•Enable Logging:Check this box to log what activity occurs for this profile.Configuring Microsoft SecurityThe default security setting is Funk. If you want to use Microsoft security, you need to select it as your security choice.3An alert box appears telling you that you must save your settings and clean boot the CN3 Computer for your new security choice to take effect. Tap Yes or press Esc to clear this box.4Save your settings, then perform a clean-boot on the CN3 Computer.Networks already configured are preferred networks. You can connect to only preferred networks or search for and connect to any available network.1Select Start > Settings > the System tab > the Intermec Settings icon.2Tap (+) to expand Communications > 802.11 Radio > Security Choice. Tap to select “Microsoft Security” from the drop-down list, press Enter.
Chapter 5 —  Network SupportCN3 Mobile Computer User’s Manual - PRELIMINARY 149A wireless network can be added either when the network is detected, or manually by entering settings information. To determine if authentication information is needed, see your network administrator.2Enter a Network name. If the network was detected, the network name is entered and cannot change.From Connects to, select to what your network is to connect. If you select “Work,” you can do a VPN connection or use proxy servers. If you select “The Internet,” you can connect directly to the internet.To connect to an ad-hoc connection, select This is a device-to-device (ad-hoc) connection.1Tap  Start > Settings > the Connections tab > the Wi-Fi icon, then tap Add New . . .
Chapter 5 — Network Support150 PRELIMINARY - CN3 Mobile Computer User’s Manual3Do the following to disable WEP encryption:aSet Authentication to either “Open” if WEP keys are not required; or “Shared” when WEP keys are required for association. bSet Data Encryption to “Disabled.”4Do the following to enable WEP encryption:aSet Authentication to either “Open” if WEP keys are not required; or “Shared” when WEP keys are required for association.bSet Data Encryption to “WEP.”cTo change the network key, clear The key is automatically provided, then enter the new Network key and select the appropriate Key index.
Chapter 5 —  Network SupportCN3 Mobile Computer User’s Manual - PRELIMINARY 1515Do the following to enable WPA authentication:aSet Authentication to “WPA.”bSet Data Encryption to either “AES” or “TKIP.”cEnter the new Network key:6Do the following to enable WPA authentication using a preshared key:aSet Authentication to “WPA-PSK.” bSet Data Encryption to either “AES” or “TKIP.”cEnter the new Network key.
Chapter 5 — Network Support152 PRELIMINARY - CN3 Mobile Computer User’s Manual7Do the following to enable WPA2 authentication:aSet Authentication to “WPA2.”bSet Data Encryption to either “AES” or “TKIP.”cEnter the new Network key:8Do the following to enable WPA2 authentication using a preshared key:aSet Authentication to “WPA2-PSK.” bSet Data Encryption to either “AES” or “TKIP.”cEnter the new Network key.
Chapter 5 —  Network SupportCN3 Mobile Computer User’s Manual - PRELIMINARY 1539Tap  Next, select either “PEAP” or “Smart Card or Certificate” for the EAP type, then tap Properties to adjust its settings. Tap Finish to return to the Configure Wireless Network screen.From the Networks to access drop-down list, select “All Available,” “Only access points,” or “Only computer-to-computer” depending on the type of networks to which you connect. Tap ok to close this screen.ManagementUse the following tool and information to configure and manage your net-work. You can also contact your Intermec representative for support.SmartSystems™ Foundation Console (www.intermec.com/SmartSystems)This tool, available as a free download from Intermec, includes a manage-ment console that provides a default method to configure and manage Intermec devices “out-of-the-box,” without the purchase of additional soft-ware licenses. This is for anyone who must configure and deploy multiple devices or manage multiple licenses.Note: If you select to connect to non-preferred networks, your CN3 Com-puter detects any new networks and provides configuration opportunities.
Chapter 5 — Network Support154 PRELIMINARY - CN3 Mobile Computer User’s ManualUse the Intermec Settings applet to do device configuration settings within the SmartSystems Foundation. Information about the Intermec Settings applet is in the Intermec Computer Command Reference Manual (P/N: 073529) available online at www.intermec.com.Information about the SmartSystems Foundation is available as an online help within the SmartSystems Console application. Select SmartSystems > Help in the console to access the manual.See the Data Collection Resource Kit in the IDL for information about data collection functions. The IDL is available as a download from the Intermec web site at www.intermec.com/idl. Contact your Intermec repre-sentative for more information.SNMP Configuration on the Mobile ComputerIn short, SNMP is an application-layer protocol that uses the exchange of management information between network devices. The CN3 Computer is such an SNMP-enabled device. Use SNMP to control and configure the CN3 Computer anywhere on an SNMP-enabled network.The CN3 Computer supports four proprietary Management Information Bases (MIBs) and Intermec provides SNMP support for MIB-II through seven read-only MIB-II (RFC1213-MIB) Object Identifiers (OIDs).The Management Information Base is a database that contains information about the elements to be managed. The information identifies the manage-ment element and specifies its type and access mode (Read-Only, Read-Write). MIBs are written in ASN.1 (Abstract Syntax Notation.1) — a machine independent data definition language. Note: Elements to manage are represented by objects. The MIB is a structured collection of such objects. Tap  Start > Settings > the System tab > the Intermec Settings icon, then tap to expand the SmartSystems Information option.Note: Only query the seven OIDs through an SNMP management station.Management Information Base
Chapter 5 —  Network SupportCN3 Mobile Computer User’s Manual - PRELIMINARY 155These MIB files are either in the CN3 Management Tools or on the web via www.intermec.com:•INTERMEC.MIBDefines the root of the Intermec MIB tree.•ITCADC.MIBDefines objects for Automated Data Collection (ADC).•ITCSNMP.MIBDefines objects for Intermec SNMP parameters and security methods, such as an SNMP security IP address.•ITCTERMINAL.MIBDefines objects for parameters, such as key clicks.Object IdentifiersEach object has a unique identifier called an OID, which consist of a sequence of integer values represented in dot notation. Objects are stored in a tree structure and OIDs are assigned based on the position of the object in the tree. For example, the internet OID is equal to 1.3.6.1.MIB-II Item OID Group or Table DescriptionifNumber 1.3.6.1.2.1.2.1.0 Interfaces Group Indicates the number of adapters present in the system. For the CN3 Computer, if one adapter is present in the system, then ifNumber = 1 and ifIndex = 1.ifIndex 1.3.6.1.2.1.2.2.1.1.ifIndex Interfaces Table (ifTable) A unique value for each interface. The value ranges between 1 and the value of ifNumber.ifDescr 1.3.6.1.2.1.2.2.1.2.ifIndex Interfaces Table (ifTable) A textual string containing infor-mation about the interface.ifType 1.3.6.1.2.1.2.2.1.3.ifIndex Interfaces Table (ifTable) An integer containing informa-tion about the type of the inter-face. It is equal to 1 for Other.ipAdEntAddr 1.3.6.1.2.1.4.20.1.1.IpAddress IP address Table(ipAddrTable)The IP address to which this entry’s addressing information pertains (same as CN3 IP address), where IP Address is the valid non-zero IP address of the CN3 Computer.ipAdEntIfIndex 1.3.6.1.2.1.4.20.1.2.IpAddress IP address Table(ipAddrTable)Index value that uniquely identi-fies the interface that this entry is applicable (same as ifIndex).ipAdEntNetMask 1.3.6.1.2.1.4.20.1.3.IpAddress IP address Table(ipAddrTable)The subnet mask associated with the IP address of this entry (same as Subnet Mask).
Chapter 5 — Network Support156 PRELIMINARY - CN3 Mobile Computer User’s ManualConfiguring with SNMPThe community string allows an SNMP manager to manage the CN3 Computer with a specified privilege level. The default read-only commu-nity string is “public” and “private” is the default read/write community string. See the specific configuration parameter to find its OID. To configure the CN3 Computers using SNMP1Configure CN3 Computers for RF communications.2Determine the OID (Object Identifier) for the parameter to change. The Intermec base OID is 1.3.6.1.4.1.1963.3Use your SNMP management station to get and set variables that are defined in the Intermec MIBs. You can set the traps, identification, or security configuration parameters for SNMP.
CN3 Mobile Computer User’s Manual - PRELIMINARY 157IIndex
Index158 PRELIMINARY - CN3 Mobile Computer User’s ManualNumerics1D area imager reading distances, 62D area imager reading distances, 5802.11WPA authenticationZero Configuration, 151WPA authentication with pre-shared keyZero Configuration, 151WPA2 authenticationZero Configuration, 152WPA2 authentication with pre-shared keyZero Configuration, 152zero configurationWEP encryption, 150802.1x authenticationFunk, 133802.1x securitytroubleshooting, 94AAB8 batteries, 7AB9 batteries, 7Abstract Syntax Notation.1 See ASN.1Accountsvia Messaging, 58ActiveSyncActiveSync Help, 38adding programs, 34adding programs to Start menu, 36Folder behavior connected to email server, 57installing applications, 71Internet Explorer Mobilefavorite links, 66mobile favorites, 66Mobile Favorites folder, 66URL, 36Windows Mobile, 36Adding programsActiveSync, 34to the Start menu, 35via ActiveSync, 36via File Explorer, 36Windows Mobile, 33Address assigned to CK60, 89Adjusting settingsWindows Mobile, 33Advanced Encryption Standard, 129AES (Advanced Encryption Standard), 129AllDay eventsCalendar, 40creating, 42AppletsBluetooth, 88Bluetooth audio, 107intemec settingsbeeper volume, 11, 154intermec settingsbeeper volume, 15Bluetooth, 109funk security, 131SF51 scanner information, 90smartsystems, 11, 154vibrate, 17phone settingsGSM radios, 116pictures & videos, 87power, 9battery status, 7sounds & notifications, 9vibrator, 17wireless managerbluetooth, 100phone, 114wireless printing, 105AppointmentsCalendaradding a note, 44assigning to a category, 45changing, 42creating, 42deleting, 47finding, 47making recurring, 45setting a reminder, 43viewing, 41via Calendar, 38ASN.1, 154Avalanche, 72BBar codestroubleshooting, 95Batterystatus, 7Beeperenabling via Sounds & Notifications applet, 9volumeturning it on, 15, 17Block recognizerWindows Mobile input panel, 27BluetoothBluetooth Audio applet, 107connecting with remote devices, 110discovering headsets, 108intermec settings, 109wireless manager, 100Wireless Printing applet, 105
IndexCN3 Mobile Computer User’s Manual - PRELIMINARY 159Bluetooth applet, 89address assigned to CK60, 89devices, 88enabling for SF51 scanner, 88Bluetooth Audio appletBluetooth, 107Browsing the InternetInternet Explorer Mobile, 68CCalendarall day events, 40creating, 42appointmentsadding a note, 44assigning to a category, 45changing, 42creating, 42deleting, 47finding, 47making recurring, 45setting a reminder, 43viewing, 41categories, 39meetingssending a request, 46optionschanging, 47Pocket Outlook, 38recurrence pattern, 41Start menu icon, 23synchronizing, 39Call historyPhone applicationGSM radios, 115Camera, 87Capacitorinternal super, 7Capturing thoughts and ideasvia Notes, 54Categoriescalendar, 39contactsassigning to, 51Cisco Key Integrity Protocol, 129Cisco Lightweight EAP, 145CKIP (Cisco Key Integrity Protocol), 129Clean boot, performing, 3Cleaning the scanner window and CK60 screen, 97CompactFlash cardsinstalling applications, 72Configuration parameters, 90Configuring security, 128Configuring service settingsPhone applicationGSM radios, 117Configuring the CK60troubleshooting, 93Configuring the SF51 scanner, 88Connecting toan ISP, 119email server, 154work, 121Connecting to a mail servervia Messaging, 58Connectionsdirectly to email server, 154ending, 125to an ISP, 119via modem, 119to work, 121via VPN server, 124via modemto an ISP, 119via VPN serverto work, 124via wireless network, 148Contactsadding a note, 50adding a telephone numberGSM radios, 115assigning to a category, 51changing, 50changing options, 53copying, 51creating, 48, 50deleting, 52finding, 52Pocket Outlook, 48sending a message, 51Start menu icon, 24synchronizing, 49viewing, 49Converting writing to text, 29Converting writing to text on the screen, 29Copyingcontacts, 51
Index160 PRELIMINARY - CN3 Mobile Computer User’s ManualCreatinga modem connectionto an ISP, 119a VPN server connectionto work, 124a wireless network connection, 148contacts via Contacts, 48document via Word Mobile, 60drawing via Notes, 30note via Notes, 55task via Tasks, 53workbook via Excel Mobile, 63DDetect rogue APs, 147EEAP (Extensible Authentication Protocol), 130EAP-FAST, 130profile security information, 146WEP encryption, 146EAP-TLS, 141EAP-Tunneled TLS, 142EasySetcreating an SF51 connection label, 88scan bar code labels, 90Edition information, 3EmailsSMS messages via Phone applicationGSM radios, 116Ending a connection, 125EthernetiConnect, 126Excel Mobileabout, 62creating a workbook, 63tips, 63Extensible Authentication Protocol, 130FFAST (Flexible Authentication via Secure Tunnel-ing), 130Favorite linksInternet Explorer Mobile, 66File Exploreradding programs to Start menu, 36removing programs, 36Windows Mobile, 32Flash File Storepackaging an application, 71Flexible Authentication via Secure Tunneling(FAST), 130Folder behavior connected to email serverActiveSync, 57IMAP4, 58POP3, 57SMS, 57Funk security, 130802.1x, 133selecting a profile, 131static WEP, 135WPA, 131GGetting connectedISP, 118to an ISP, 119creating a modem connection, 119to work, 121creating a VPN server connection, 124creating a wireless network connection, 148Windows Mobile, 118GSM/GPRSphone application, 114HHeadsetsconnecting, 108discovering, 108IiConnect, 126disabling network communications, 126network support, 126ping test, 127IDLsBluetooth, 100, 105data collection, 11, 154smartsystems, 76URL, 13Imagerbeeper volumeturning it on, 17configuration parameters, 90Imager settingsSF51 scanner, 88IMAP4Folder behavior connected to email server, 58Input panelblock recognizer, 27keyboard, 26letter recognizer, 27selecting typed text, 28transcriber, 27Windows Mobile, 24Word Mobile, 61word suggestions, 26
IndexCN3 Mobile Computer User’s Manual - PRELIMINARY 161Installing applicationsAvalanche, 72SmartSystems, 73using a storage card, 72using Secure Digital cards, 72with ActiveSync, 71Intermec Developer Library, 11Intermec settingsbeeper volume, 154Intermec Settings appletBluetooth, 109enable speaker, 15Funk security, 131set vibrator, 17viewing SF51 information, 90Intermec settings appletsmartsystems, 11, 154INTERMEC.MIB, 155Internal scannersreading distancesEA11, 6Internet Explorer Mobileabout, 66browsing the Internet, 68favorite links, 66getting connected, 118mobile favorites, 66Mobile Favorites folder, 66viewing mobile favorites and channels, 68ISPconnecting to via Windows Mobile, 119creatinga modem connection, 119Internet Explorer Mobile, 66Windows Mobile, 118ITCADC.MIB, 155ITCSNMP.MIB, 155ITCTERMINAL.MIB, 155KKeeping a todo listvia Tasks, 53KeyboardWindows Mobile input panel, 26LLEAP securityfast roaming (CCKM), 148Microsoft, 145Letter recognizerWindows Mobile input panel, 27Loading certificates, 128Microsoft, 144MManaging email messages and foldersvia Messaging, 57MeetingsCalendarsending a request, 46via Calendar, 38Messagessending tocontacts, 51via Messagingcomposing/sending, 59Messagingaccounts, 58composing/sending messages, 59connecting to a mail server, 58getting connected, 118managing email messages and folders, 57Pocket Outlook, 56Start menu icon, 24synchronizing email messages, 56using My Text, 31MIBsASN.1, 154files, 154object identifier, 155Microsoft security, 130allow fast roaming (CCKM), 148detect rogue APs, 147enable mixed cell, 148LEAP, 145PEAP, 139TLS, 141TTLS, 142Mixed cellenable via Microsoft security, 148Mobile FavoritesInternet Explorer Mobile, 66Mobile Favorites folderInternet Explorer Mobile, 66Modemscreating a connectionto an ISP, 119MP3 filesWindows Media Player, 65NNetwork adapters, 126Network settingsPhone applicationGSM radios, 118
Index162 PRELIMINARY - CN3 Mobile Computer User’s ManualNotesadding toappointments, 44contacts, 50creating a note, 55drawing on the screen, 30creating a drawing, 30selecting a drawing, 30Pocket Outlook, 54recording a message, 31synchronizing notes, 55writing on the screen, 28alternate writing, 29converting writing to text, 29selecting the writing, 28tips for good recognition, 29OObject Storepackaging an application, 70Operating the CK60troubleshooting, 92PPackaging an applicationFlash File Store, 71Object Store, 70Secure Digital storage cards, 70SmartSystems Platform Builds, 70PEAP securityMicrosoft, 139Performing a clean boot, 3Phonewireless manager, 114Phone applicationGSM radios, 114adding contact to speed dial, 115call history, 115customizing phone settings, 116finding, setting, selecting networks, 118sending SMS messages, 116service settings, 117Phone Settings appletcustomizing via Phone applicationGSM radios, 116GSM radios, 116network settingsGSM radios, 118Pictures & Videos applet, 87Ping testiConnect, 127Pocket Internet ExplorerStart menu icon, 24Pocket Outlook, 38Calendar, 38POP3Folder behavior connected to email server, 57Powerappletbattery status, 7Power appletbattery status, 9PowerPoint Mobilestarting a slide show presentation, 64Windows Mobile, 64Programs, adding or removingWindows Mobile, 33Protected EAP, 139RReader commands, 90Reading distancesEA11, 6Record buttonrecording a message, 31Recordingvia Notes, 31Recurrence patternCalendar, 41Removing programsWindows Mobile, 33, 36Reset button, 3Resource kitsBluetooth, 100, 105data collection, 11, 154smartsystems, 76URL, 13RoamingMicrosoft security, 148SScanning bar codestroubleshooting, 95Scheduling appointments and meetingsvia Calendar, 38Secure Digital cardsinstalling applications, 72packaging an application, 70Securitychoosing between Funk and Microsoft, 130configuring, 128loading certificates, 128wireless network, 128Selectingdrawing via Notes, 30Selecting the writing on the screen, 28Sending and receiving messagesvia Messaging, 56
IndexCN3 Mobile Computer User’s Manual - PRELIMINARY 163ServicesPhone applicationGSM radios, 117Settings appletsBluetooth, 88Bluetooth audio, 107intermec settingsBluetooth, 109funk security, 131SF51 scanner information, 90wireless printing, 105SF51 scannerconfiguring, 88creating a connection label, 88enabling BluetoothBluetoothenabling for SF51 scanner, 88imager settings, 88viewing information from CK60 computer, 90Simple Network Management Protocol See SNMPSmartSystems, 11, 73, 154SMSFolder behavior connected to email server, 57SMS messagesPhone applicationGSM radios, 116SNMP, 154Sounds & Notifications appletenable beeper, 9set vibrator, 17Speakers, 14beeper volumeturning it on, 15enabling via intermec settings applet, 15Speed dialPhone applicationGSM radios, 115SSPBpackaging an application, 70Start Menuadding programs, 35via ActiveSync, 36via File Explorer, 36Static WEP securityFunk, 135Status iconsWindows Mobile, 23Synchronize system time, 84SynchronizingCalendar, 39contacts, 49email messages, 56favorite links, 66mobile favorites, 66notes, 55Tasks, 54Word Mobile, 62System software updates, 73System time, 84TTaskscreating a task, 53Pocket Outlook, 53Start menu icon, 24synchronizing, 54Temporal Key Integrity Protocol, 129Text messagesWindows Mobile, 31Time server, 84Tips for workingExcel Mobile, 63TKIP (Temporal Key Integrity Protocol), 129TLS securityMicrosoft, 141Today screenWindows Mobile, 23Tools CDCAB files, 72MIB files, 155Tracking peoplevia Contacts, 48TranscriberWindows Mobile input panel, 27Troubleshooting, 92802.1x security, 94bar code scanning, 95CK60 configuration, 93CK60 operation, 92wireless connectivity, 93TTLS securityMicrosoft, 142Typing modeWord Mobile, 61Typing on the screenWord Mobile, 61UUpdatingbootloader, 71Updating the system software, 73Upgrading the operating system, 92
Index164 PRELIMINARY - CN3 Mobile Computer User’s ManualURLsActiveSync, 36MIBs, 155Microsoft support, 22Windows Mobile, 22Windows Mobile support, 22VVibratorenabling via intermec settings applet, 17enabling via sounds & notifications applet, 17Viewing mobile favorites and channelsInternet Explorer Mobile, 68VPN servercreating a connectionto work, 124WWAP pages, 66connecting to an ISP, 119Wavelink Avalanche, 72Web pages, 66connecting to an ISP, 119WEP (Wired Equivalent Privacy) encryption, 129WEP encryptionEAP-FAST security method, 146zero configuration, 150Wi-Fi Protected Access, 129, 131Windows Media filesWindows Media Player, 65Windows Media Player MobileStart menu icon, 24Windows MobileActiveSync, 36basic usage, 22Calendar, 38command bar, 24Contacts, 48Excel Mobile, 62getting connected, 118Messaging, 56navigation bar, 24Notes, 54notifications, 25popup menus, 24PowerPoint Mobile, 64programs, 23status icons, 23support URLs, 22Tasks, 53Today screen, 23where to find information, 22Word Mobile, 60writing on the screen, 28Wired Equivalent Privacy, 129, 135Wireless 802.11b/giConnect, 126Wireless connectivitytroublshooting, 93Wireless Manager appletbluetooth, 100phone, 114Wireless networkcreating a connection, 148security, 128Wireless Printing applet, 105Word Mobileabout, 60creating a document, 60synchronizing, 62typing mode, 61writing mode, 62Workcreatinga VPN server connection, 124getting connected, 121WPA (Wi-Fi Protected Access), 129WPA authentication802.11 radio moduleZero Configuration, 151with pre-shared keyZero Configuration, 151WPA securityFunk, 131WPA2 (Wi-Fi Protected Access), 129WPA2 authentication802.11 radio moduleZero Configuration, 152with pre-shared keyZero Configuration, 152Writing modeWord Mobile, 62Writing on the screenWord Mobile, 62
Corporate Headquarters6001 36th Avenue WestEverett, Washington 98203U.S.A.tel 425.348.2600fax 425.355.9551www.intermec.comCN3 Mobile Computer User's Manual*935-003-001*P/N 935-003-001

Navigation menu