Intermec Technologies 08CN3 CN3 with DHIB and MC75 User Manual CN3UserManual

Intermec Technologies Corporation CN3 with DHIB and MC75 CN3UserManual

User Manual part 5 of 6

CN3 Mobile Computer User’s Manual 109
5Network Support
This chapter includes information about the different networks supported
by the CN3 Mobile Computer, and ways to configure and manage those
networks. Note that the CN3 automatically installs the appropriate
software for radio or phone use when the CN3 is turned on.
Note: Desktop icons and settings icons are shown to the left. Any place that
Start is mentioned, tap the following Windows icon in the top, left corner
of your CN3 desktop.
Chapter 5 — Network Support
110 CN3 Mobile Computer User’s Manual
Wireless Network Support
Radios are installed at the factory and cannot be installed by a user. The
CN3 must be serviced to install or replace radios. Contact your Intermec
representative for more information.
Personal Area Networks
“Bluetooth” is the name given to a technology standard using short-range
radio links, intended to replace cables connecting portable and fixed
electronic devices. The standard defines a uniform structure for a range of
devices to communicate with each other with minimal user effort. Its key
features are robustness, low complexity, low power, and low cost. The
technology offers wireless access to LANs, the mobile phone network, and
the internet for a host of home appliances and mobile computer interfaces.
Wireless Printing can also be done with Microsoft APIs, including
Bluetooth extensions for Winsock, and Bluetooth virtual COM ports.
Information about other Bluetooth software is in the Bluetooth Resource
Kit and the Bluetooth Resource Kit Users Guide via the Intermec Developer
Library (IDL), which is available as a download from the Intermec web via
www.intermec.com/idl. See your Intermec representative for information.
Configuring with the Wireless Manager
Note: Changes or modifications not expressly approved by Intermec could
void the users authority to operate the equipment.
Note: The Wireless Manager application is available only when Microsoft
Zero Configuration is enabled. If Intermec Security is enabled, then this
application is not available. See page 175 for information on enabling and
configuring Microsoft Security.
You can use the Wireless Manager to enable and disable Bluetooth, Wi-Fi,
and the Phone if it is built into your CN3.
To enable Bluetooth using the Wireless Manager
•Tap Start > Settings > the Connections tab > the Wireless Manager
icon, or
Tap the Wireless Manager row from the Today desktop.
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual 111
In the Wireless Manager, either tap All or tap Bluetooth, then wait for
“On” to appear beneath the Bluetooth row.
Once activated, information appears in the Today desktop like the
following. Note the Bluetooth icon is on the right.
Tap Menu > Bluetooth Settings to perform a device search (more
information on the next page). Tap Done to close the Wireless Manager.
Enabling Bluetooth After a Clean Boot
Bluetooth is not started by default after a clean-boot is performed.
The CN3 retains the Bluetooth state when clean-boots are performed, for
example:
If Bluetooth was enabled before a clean-boot was performed, the CN3
boots up with the Bluetooth state enabled and Bluetooth virtual COM
ports (such as printing) registered. Reactivate the connections manually
as the system does not do them.
If Bluetooth was disabled before a clean-boot was performed, the CN3
boots up with Bluetooth disabled.
To turn on Bluetooth
Select Start > Settings > the Connections tab > the Bluetooth icon >
the Mode tab, then check Turn on Bluetooth.
If the CN3 is to be found by other Bluetooth devices that require such
visibility, then check Make this device visible to other devices.
To enable Bluetooth
•Tap Start > Settings > the Connections tab > the Bluetooth icon.
Chapter 5 — Network Support
112 CN3 Mobile Computer User’s Manual
In most cases, the CN3 will find other Bluetooth devices, such as a printer,
GPS receiver, headset, or hands-free device.
To scan for other Bluetooth devices
1Tap the Devices tab, then tap Add new device... to search for (or scan)
remote Bluetooth devices.
2When the CN3 is finished scanning, any newly found devices appear in
the box. Tap Refresh to perform additional searches.
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual 113
3Select a device to which to connect, then click Next.
Chapter 5 — Network Support
114 CN3 Mobile Computer User’s Manual
4Enter a passkey to establish a secure connection, then tap Next. Passkeys
are typically provided in the documentation that comes with the
Bluetooth device being searched. Tap Yes if prompted to let the other
device connect with your CN3.
5Select what services you want from this remote device, then click Finish
to return to the Devices tab.
To connect with other devices
1Tap the COM Ports tab, then tap New Outgoing Port to connect to a
Bluetooth device.
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual 115
2Select the device to add, then click Next.
3Select a port from the Port drop-down list, check Secure Connection,
then click Finish to return to the COM Ports page.
4Tap New Incoming Port to allow other Bluetooth devices to connect
with your CN3. Select on which port to secure this connection, then
click Finish to return to the COM Ports page.
5You can press and hold on a device to edit that device or delete it from
the list.
Chapter 5 — Network Support
116 CN3 Mobile Computer User’s Manual
Using the Wireless Printing Applet
The Wireless Printing applet separates the task of wireless printing from
other Bluetooth management items not relevant to this task.
Wireless Printing has a concept of the “current wireless printer.” This
printer is the one to which the CN3 makes a connection when the wireless
printing COM port is opened. If there is no current wireless printer, there is
no wireless printing COM port. Registration and deregistration of this
COM port is controlled by the Bluetooth COM port control. Use the
Wireless Printing applet to handle the COM port registration. Customer
software or other test applications can also use this applet to manage the
COM port registration and deregistration.
The current wireless printer is stored in the registry and is registered and
deregistered on Bluetooth stack load/unload. If the current wireless printer
changes, the existing wireless printing COM port is deregistered, and the
new one is registered instead. The registered COM port is stored in the
registry as the “WPort.
For information on using Bluetooth communications, see the Bluetooth
Resource Kit in the IDL, which is available as a download from the
Intermec web site at www.intermec.com/idl. Contact your Intermec
representative for more information.
Use any of the following methods to set the wireless printer:
Use a Bluetooth device search to locate the remote device.
Manually enter the remote Bluetooth Device Address.
Use Current Wireless Printer to set a different printer.
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual 117
To perform a Bluetooth device search
4In about half a minute, Bluetooth devices found within your range will
appear. If your preferred printer is in the list, select to highlight the
printer, then tap OK.
5If you do not see your preferred device, make sure this device is powered
on and set to search, then tap Search again.
6Tap Cancel to return to the first screen without making changes.
1Select Start > Settings > the System tab > the Wireless Printing icon.
2Clear the Show Printers Only box if you want to find more than just the
Bluetooth printers.
3Tap Search to initiate the device search.
Chapter 5 — Network Support
118 CN3 Mobile Computer User’s Manual
To perform a manual setup
When you set your printer manually, your device may not receive the
printer name. Therefore, “-unknown-” can display under Device Name.
To set a different printer
3Tap either Search or Manual, tap OK, then do the applicable steps.
4Tap Cancel to return to the current wireless printer settings without
making changes, then tap Exit to close the applet.
Note: If you know the Bluetooth Device Address of the printer you want to
use, use this procedure to avoid a Device Search.
1Select Start > Settings > the System tab > the Wireless Printing icon.
2Tap Manual, enter the address of your device in the field, then tap OK.
Tap Cancel to return to the first screen without making changes.
1Select Start > Settings > the System tab > the Wireless Printing icon.
2Tap Set Different Printer to return to the device search screen.
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual 119
Connecting to Bluetooth Audio Devices
The Bluetooth audio user interface is a part of the Bluetooth Audio applet.
You can use this applet to search for, activate, and connect to Bluetooth
audio devices, such as Bluetooth headsets. You can control the audio
volume and the amplification for the microphone for the connected
Bluetooth audio device (if the connected device has these capabilities).
To access the Bluetooth Audio applet
Searching for Bluetooth Headsets
To search for a Bluetooth headset with either a “headset” or a “hands-free
profile, tap Search for devices. Audio devices that are found are added to
the list with an icon to identify either profile.
1When searching for a device, select Yes at the following prompt to allow
that device to connect to your CN3.
2Enter the passcode that is provided with your Bluetooth audio device,
such as “0000,” then tap Next to finish pairing with your audio device.
The passcode is provided by the manufacturer of your Bluetooth audio
device. You can usually find your passcode in the user manual that is
provided with your audio device.
1From the CN3 desktop, select Start > Settings.
2Tap the System tab, then tap the Bluetooth Audio icon.
Chapter 5 — Network Support
120 CN3 Mobile Computer User’s Manual
3Select the services tied to the Bluetooth audio device to which you are
connecting, then tap Finish.
Once the pairing is successfully completed, the Bluetooth audio device
appears in the list of devices that are found. You can double-tap any of the
devices for a pop-up menu to set it as a default, make a connection, refresh
the connection, or delete the device from the list.
Audio Device Icons
Each device has two icons to the left, one to reflect its connection status,
the other to reflect its default status. This table lists their meanings:
Note: You can only select one Bluetooth audio device as the default device.
You must set a device to default before you can connect to that device.
Bluetooth Audio Device Status Icons
Icon Description
Your CN3 and your Bluetooth audio device are not connected. Note the red
diagonal bar.
Your CN3 and your Bluetooth audio device are connected.
Your Bluetooth audio device is not set as the default.
Your Bluetooth audio device is set as the default. Note the red check mark.
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual 121
Connecting to a Bluetooth Headset
If you find several Bluetooth audio devices, you can only connect to one
audio device. Before you can connect to that device, you must set it as the
default audio device.
To connect to an audio device
1Double-tap a device for its pop-up menu, then select to check Set as
default if it is not already checked.
On successful device activation, the device icon changes to include a red
check mark. You can set another device as the default without having to
clear the red check mark on the original.
2Select Refresh to retrieve missing information from a device. Select
Delete to remove a device from the list.
3If the activated device has a “hands-free” profile, press a button on the
device to establish an audio connection between the CN3 and the
activated device. See the user manual for the Bluetooth device for
information on what button to press.
4To establish an audio connection to the activated device with either a
“headset” or “hands-free” profile, double-tap the audio device, then
select Connect from the pop-up menu.
A check mark is added to this option in the pop-up menu. To disconnect
from the audio device, repeat this step to clear the check mark.
Chapter 5 — Network Support
122 CN3 Mobile Computer User’s Manual
5When connection is established, the “connected/disconnected” status
changes to that of a “connected” status and the Audio Device Settings
are enabled to adjust settings of the connected Bluetooth audio device.
Configuring Bluetooth Using Intermec Settings
You can also configure your Bluetooth communications using Intermec
Settings.
To configure Bluetooth using Intermec Settings
Connecting with Bluetooth
Make sure Bluetooth is enabled on your mobile phone. For example, with
the Nokia 3650, go to its menu, select Connect > Bluetooth, then set My
phones visibility to “Shown to all.
1From the CN3 desktop, select Start > Settings > the System tab > the
Intermec Settings icon.
2Tap (+) to expand Communications, then Bluetooth to configure its
settings.
Note: While these instructions apply to many Bluetooth devices, these
instructions use the Nokia 3650 for example purposes.
Tap the Microphone slider to adjust the
amplification
Tap the Volume slider bar
to adjust the volume
maintain your connection when you suspend the CN3
Check Keep audio connected at suspend to
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual 123
Before you connect to the network, make sure Bluetooth is enabled on your
CN3 so you can find and connect to remote devices. Go to “Personal Area
Networks” on page 110 for information. Once connected, you should be
able to browse Internet websites and use other online resources.
To establish a Bluetooth connection between your CN3 and your mobile phone, then
establish a dial-up networking session with your wireless network
2Enter a name for the connection, such as “Nokia.” In the Select a
modem list, select “Bluetooth,” then tap Next to continue.
1Tap Start > Settings > the Connections tab > the Connections icon,
then tap Add a new modem connection.
Chapter 5 — Network Support
124 CN3 Mobile Computer User’s Manual
3Tap Add new device... if the phone is not listed in the known devices.
Make sure your Bluetooth device is turned on before you start the search.
4When the search for devices is complete, select your Bluetooth device,
then tap Next to continue.
5Enter the correct Passkey on both the Bluetooth device and the CN3,
then tap Next to continue.
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual 125
6Enter a name for the device if needed, or select what services to use, then
tap Finish.
7Select the Bluetooth device to use to connect to the network, then tap
Next to continue.
8Enter the appropriate number as it should be dialed for your Bluetooth
connection, then tap Next to continue.
Chapter 5 — Network Support
126 CN3 Mobile Computer User’s Manual
9Enter the user name, password, and domain required for your Bluetooth
device, then tap Finish.
Now you can establish a connection to your network via the Internet
Explorer application. To disconnect, tap the Connectivity icon in the top
menu bar, then select Disconnect.
Local Area Networks (LANs)
The CN3 is a versatile mobile computer that you can add to your wired or
wireless LAN. It has an internal 802.11b/g radio to transfer data using
wireless communications. This section of the manual assumes that you have
already set up your wireless communications network including access
points.
Your CN3 supports TCP/IP network protocols. The easiest way to
configure the network parameters on the CN3 is to use Intermec Settings .
See “Using the Intermec Settings Applet” on page 15 for more
information.
In a TCP/IP network, the CN3 communicates with a host computer
directly using TCP/IP. The access point acts as a bridge to allow
communications between the wired and wireless networks.
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual 127
Using the CDMA Radio Phone Application
With the CDMA radio module installed in your CN3, you can send and
receive telephone EV-DO (1x Evolution Data Optimized) calls as well as
transmit data via wide-area (WAN) cellular networks.
The CN3 provides a phone speaker, microphone, and speakerphone, and
supports the use of a Bluetooth headset or hands-free kit. At factory-
default, the phone is not activated.
Using the Wireless Manager to Turn on the Phone
You can use the Wireless Manager to enable and disable Bluetooth, Wi-Fi,
and the Phone if it is built into your CN3.
To turn on the phone using the Wireless Manager
2In the Wireless Manager, either tap All or tap Phone, then wait for “On
to appear beneath the Phone row.
3Once activated, the name of your phone network appears in the Today
screen like the following:
4Tap Menu > Phone Settings to configure the phone (more information
to follow).
5Tap Done to close the Wireless Manager.
Note: The Wireless Manager application is available only when Microsoft
Zero Configuration is enabled. If Intermec Security is enabled, then this
application is not available. See page 175 for information on enabling and
configuring Microsoft Security.
1Tap Start > Settings > the Connections tab > the Wireless Manager
icon, or tap the Wireless Manager row from the Today desktop.
Chapter 5 — Network Support
128 CN3 Mobile Computer User’s Manual
Activating the Phone
The CDMA phone is activated using the Activation Wizard in the Phone
application. Contact your Intermec representative for more information.
With the WAN radio module installed in your CN3, you can send and
receive telephone calls. Use the speaker on the back of the computer as your
earpiece and use the connector on the bottom of the computer for your
mouthpiece.
To initiate activation before using your Phone application
1Tap Start > Phone from the Today screen to access the application which
processes your phone calls. Tap the Close button in the upper right
corner of this application to close.
2In the Phone application, tap Menu > Activation Wizard from the
bottom of the screen.
3Have your activation code, phone number (MDN), and MSID
information ready before you tap Next to continue. You can get this
information from your network provider.
Note: If you wish to perform this activation another time, tap Cancel to
close this wizard, then tap Yes.
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual 129
4Enter your 6-digit activation code (hidden by asterisks), then tap Next to
continue.
5Enter the phone number and MSID from Sprint, then tap Next to
continue.
6The application prompts whether the information entered is correct. If
so, tap Yes to continue, else tap No to return to the previous screen.
Chapter 5 — Network Support
130 CN3 Mobile Computer User’s Manual
7The application acknowledges that your phone will be in service in up to
four hours. Tap Finish to close the wizard.
Using the CDMA Phone
To access the Phone application that processes your phone calls
•Tap Start > Phone.
Tap the appropriate keys to enter a telephone number, then tap Talk to dial
the number shown above the keypad.
Note: Voice service is available immediately. Data service takes up to four
hours of activation before you can use the service. If after four hours, a
data connection is not established, go to “Updating Your PCS Vision
Profile” on page 132 to manually launch data provisioning.
Tap this to backspace one digit
Tap this to select a
Tap this to access the
Contacts application
previously dialed number
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual 131
To use the Call History feature
•Tap Call History to note the telephone numbers that were previously
dialed from this CN3.
To configure your phone settings
Customizing the Phone
Tap the Phone tab to customize your phone settings such as the ring type
and ring tone to use for incoming calls, and the keypad tone to use when
entering phone numbers.
Detecting Your Network Position
Tap the Location Settings tab to allow your network to detect your
position or remain private with the exception of 911 emergencies.
To get detected
•Tap Location ON.
Either select Menu > Options from the Phone application, or
• Select Start > Settings > the Personal tab > the Phone icon to access the
applet.
Chapter 5 — Network Support
132 CN3 Mobile Computer User’s Manual
To remain private
•Tap 911 Only. This ensures that no service may use your location
without you giving permission.
Updating Your PCS Vision Profile
Tap the Data Settings tab to either repair your connection settings or
automatically update your PCS Vision.
When the built-in phone data connection used by Microsofts
connection manager is corrupted, tap Repair Connectoid to repopulate
the registry with the correct values for the data connection.
If you find you cannot make a data connection to the CDMA data
network, tap Repair Connectoid to assure that the connection entry
used by the CDMA device is correct.
For Sprint networks, if your CN3 is unable to make a data connection
and it has been more than four hours since activation, tap Provision,
then follow the prompts to launch data provisioning from this screen. It
takes a few minutes to set up the data portion of the WWAN network.
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual 133
To repair your connections
1Click Repair Connected, then tap Yes to perform the repair.
2Tap ok to return to the Data Settings tab.
To automatically update your profile
1Click Provision to start the provisioning.
2Tap ok to return to the Data Settings screen.
Note: The data provisioning process can be automatically initiated by the
Sprint network, by attempting to make a cellular line connection to the
WAN before the CN3 is data provisioned, or by manually starting the
connections through this screen. Intermec recommends that Sprint
Network “push” the data provisioning to your CN3. This should occur
shortly after the voice activation is complete.
Chapter 5 — Network Support
134 CN3 Mobile Computer User’s Manual
Setting the Roaming Range
Scroll to, then tap the System Settings tab to set your roaming feature to
either automatic with having to go through your server or to roam through
the Sprint server.
To alert the caller when roaming is enabled
•Tap Automatic.
To roam the network through the Sprint server
•Tap Sprint.
To be notified when devices are located
Check Enable Call Guard alert when roaming.
Knowing the Version Numbers of Your Phone Features
Scroll to, then tap the Version Information tab to view the latest versions
of all of your phone features. Move the scroll bar along the bottom to the
right to see additional information.
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual 135
Using the GSM/EDGE Radio Phone Application
With the WAN radio module installed in your CN3, you can send and
receive telephone calls as well as transmit data via wide-area cellular
networks. The CN3 provides a phone speaker, microphone, and
speakerphone, and supports the use of a Bluetooth headset or hands-free
kit. At factory-default, the phone is disabled. To turn on the phone, use
either of the following methods:
Using the Wireless Manager to Turn on the Phone
You can use the Wireless Manager to enable and disable Bluetooth, Wi-Fi,
and the Phone if it is built into your CN3.
To turn on the phone using the Wireless Manager
2In the Wireless Manager, either tap All or tap Phone, then wait for “On
to appear beneath the Phone row.
3Once activated, the name of your phone network appears in the Today
screen like the following:
4Tap Menu > Phone Settings to configure the phone (more information
to follow).
5Tap Done to close the Wireless Manager.
Note: The Wireless Manager application is available only when Microsoft
Zero Configuration is enabled. If Intermec Security is enabled, then this
application is not available. See page 175 for information on enabling and
configuring Microsoft Security.
1Tap Start > Settings > the Connections tab > the Wireless Manager
icon, or tap the Wireless Manager row from the Today desktop.
Chapter 5 — Network Support
136 CN3 Mobile Computer User’s Manual
Activating the Phone
The GSM/EDGE phone is activated via a SIM card that you can purchase
from your network provider, and inserted in the miniSD/SIM cavity in the
back of your CN3. Contact your Intermec representative for more
information.
To insert the SIM card
1Press the power switch to suspend the CN3, then remove the battery
pack from the back of the CN3.
2Remove the two screws on the miniSD/SIM card slot door. Note the
screws to this door are to be torqued to 1.5 in-lbs.
3Gently lift the door to the card slot, then with the metal contacts facing
down, insert the SIM card into its card slot in the door.
4Press the miniSD/SIM card slot door down, insert the two screws,
reinsert the battery pack, then press the power switch.
Once the door to the miniSD is opened (for changing, installing, or
removing the SIM or miniSD card); a cold-boot is performed.
Using the GSM/EDGE Phone
To access the application that processes your phone calls
•Tap Start > Settings > the Phone desktop icon from the Personal tab,
or
•Tap Start > Phone.
miniSD/SIM door
SIM card slot
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual 137
Tap the appropriate keys to enter a telephone number, then tap Talk to dial
the number shown above the keypad.
To use the Speed Dial feature
•Tap Speed Dial to select a telephone number with which the CN3 is to
dial automatically.
Use the Contacts application to add to this list. See “Contacts: Tracking
Friends and Colleagues” on page 54 for more information.
To use the Call History feature
•Tap Call History to note the telephone numbers that were previously
dialed from this CN3.
Tap this to backspace one digit
Tap this to select a
Tap this to view previous calls
Tap this to access the
Contacts application
previously dialed number
Chapter 5 — Network Support
138 CN3 Mobile Computer User’s Manual
To customize your phone settings
Customizing the Phone
Tap the Phone tab to customize your phone settings such as the ring type
and ring tone to use for incoming calls, and the keypad tone to use when
entering phone numbers.
Tap Change PIN to reset the personal identification number for this
phone.
Setting the Phone Services
1Tap the Services tab to access settings for any of the provided services.
Tap any of the settings, then tap Get Settings.
Either select Menu > Options from the Phone application, or
• Select Start > Settings > the Personal tab > the Phone icon to access the
applet.
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual 139
2Make your changes, then tap ok to return to the Settings screen. Below is
a sample Settings screen.
Setting Up the Network
Tap the Network tab to find, set, or select the type of network on which
this phone is to communicate.
Remote Access (Modems)
You can set up connections to the Internet and corporate network at work
to browse the Internet or intranet, send and receive e-mail, and synchronize
information using ActiveSync. Connections are made via wireless networks.
Your CN3 has two groups of connection settings: My ISP and My Work
Network. Use My ISP settings to connect to the Internet. Use My Work
Network settings to connect to any private network.
My ISP
Once connected, you can send and receive e-mail messages by using
Messaging and view web pages by using Internet Explorer Mobile. The
communication software for creating an ISP connection is already
installed on your CN3. Your service provider provides the software
needed to install other services, such as paging and fax services. If this is
the method you want to use, see “Connecting to an Internet Service
Provider” on page 140.
Chapter 5 — Network Support
140 CN3 Mobile Computer User’s Manual
My Work Network
Connect to the network at your company or organization where you
work. Once connected, you can send and receive e-mail messages by
using Messaging, view web pages by using Internet Explorer Mobile, and
synchronize with your desktop. If this is the method you want to use, see
“Connecting to Work” on page 143.
Connecting to an Internet Service Provider
You can connect to your ISP, and use the connection to send and receive e–
mail messages and view web pages.
Get an ISP dial-up access telephone number, a user name, and a password
from your ISP.
To connect to an Internet service provider
3Enter a name for the connection, such as “ISP Connection.
Tap the Help icon to view additional information for any screen in the
wizard or while changing settings.
1Tap Start > Settings > the Connections icon.
2In My ISP, tap Add a new modem connection.
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual 141
4If using an external modem connected to your CN3 with a cable, select
“Hayes Compatible on COM1” from the Select a modem list drop-
down list, then tap Next to continue.
5Enter the access phone number, then tap Next. For more information,
tap use dialing rules.
6Enter the user name, password, and domain (if provided by an ISP or
your network administrator), then tap Finish.
Chapter 5 — Network Support
142 CN3 Mobile Computer User’s Manual
7Tap the Advanced tab from the Connections screen, then tap Dialing
Rules to specify your current location. These settings apply to all
connections.
8Tap Use dialing rules, tap ok, then tap Edit to continue.
9Specify your current phone type. If your phone type is pulse dialing,
check Pulse dialing. If your type is tone dialing (as most phone lines
are), then clear Pulse dialing. Continue to tap ok to close each page and
return to the Settings page.
To start the connection, start using one of the following programs. Once
connected, you can:
Send and receive e-mail messages by using Messaging. Before you can use
Messaging, you need to provide the information it needs to
communicate with the e-mail server.
Visit web pages by using Internet Explorer Mobile. For more
information, see “Internet Explorer Mobile” on page 72.
Note: Tap Manage existing connections to change modem connection
settings in My ISP. Select the desired modem connection, tap Settings,
then follow the instructions on the screen.
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual 143
Connecting to Work
If you have access to a network at work, you can send e-mail messages, view
intranet pages, synchronize your CN3, and possibly access the Internet.
Create a modem connection via a RAS (Remote Access Server) account.
Before you can create this modem connection, your network administrator
needs to set up a RAS account for you. Your network administrator may
also give you Virtual Private Network (VPN) settings.
To connect to work
3Enter a name for the connection, such as “Company Connection.
4In the Select a modem list, select your modem type, then tap Next to
continue. If your modem type does not appear, try reinserting your CN3
into your modem dock.
If using an external modem connected to your CN3 with a cable,
select “Hayes Compatible on COM1.
If using any type of external modem, select the modem by name. If a
listing does not exist for your external modem, select “Hayes
Compatible on COM1.
Note: To change modem connection settings in My Work Network, tap
Manage existing connections. Select the desired modem connection, tap
Settings, then follow the instructions on the screen.
To view additional information for any screen in the wizard or while
changing settings, tap the Help icon.
1Tap Start > Settings > the Connections icon.
2In My Work Network, tap Add a new modem connection.
Chapter 5 — Network Support
144 CN3 Mobile Computer User’s Manual
5Enter the access phone number, using some of the following guidelines.
If you know part of the phone number changes frequently as you travel,
create dialing rules to avoid creating numerous modem connections for
the same phone number. For more information, tap use dialing rules.
Enter the phone number exactly as you want it dialed. For example, if
you call from a business complex or hotel that requires a nine before
dialing out, enter “9” in front of the phone number.
Enter the APN provided by your mobile phone service provider.
When using dialing rules, phone numbers are entered differently. To
use additional numbers, such as a “9” to dial from an office complex
or hotel, you must use additional dialing rules or change dialing
patterns. See the “Create Dialing Rules online help for information.
aIn Country/Region code, enter the appropriate code when dialing
internationally. For more information, contact an operator at your
local phone company.
bIn Area code, enter the area code, if needed.
cEnter the Phone Number, then tap Next to continue.
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual 145
4Enter the user name, password, and domain (if provided by an ISP or
your network administrator). If a domain name was not provided, try the
connection without entering a domain name. Tap Finish.
Creating a VPN Server Connection to Work
A VPN connection helps you to securely connect to servers, such as a
corporate network, via the Internet. Ask your network administrator for the
following: user name, password, domain name, TCP/IP settings, and host
name or IP address of the VPN server
To create a VPN server connection to work
To view additional information for any screen in the wizard or while
changing settings, tap the Help icon.
Note: Tap Manage existing connections > the VPN tab to change existing
settings in My Work Network. Select the desired VPN connection, tap
Settings, then follow the instructions on the screen.
1Tap Start > Settings > the Connections icon.
2In My Work Network, tap Add a new VPN server connection.
Chapter 5 — Network Support
146 CN3 Mobile Computer User’s Manual
3In Name, enter a name for the connection, such as a companys name.
In Host name/ IP, enter the VPN server name or IP address.
Next to VPN type, select the type of authentication to use with your
device: “IPSec/L2TP” or “PPTP.” If you are not sure which option to
choose, ask your network administrator. Tap Next to continue.
4Select the type of authentication. If you select A pre-shared key, enter
the key provided by your network administrator.
5Enter your user name, password, and domain name as provided by your
ISP or network administrator, then tap Finish. If a domain name was
not provided, try the connection without entering a domain name.
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual 147
Insert necessary equipment, such as a network card, into the CN3, and
use a desired program to begin connecting.
Ending a Connection
Use any of these methods to end your connection:
When connected via cable or cradle, detach your CN3.
When connected via Infrared, move the CN3 away from the other
computer or device.
When connected via a wireless network, switch off the connection.
iConnect
With iConnect, you can manage these features of your CN:
FTP server
Network interfaces
FTP Server
iConnect allows you to:
enable or disable the FTP server.
manage the state of the FTP server based on the registry key settings.
iConnect manages the state of the FTP server when iConnect first starts
and when a network change occurs though iConnect.
The easiest way to manage the FTP server is to enable the FTP menu
within iConnect.
To enable the FTP menu
Create this DWORD registry key and set it to a value of 1:
HKEY_CURRENT_USER\Software\iConnect2\IConnect\Settings\ShowFTPMenu
When connected via modem or VPN, tap the Connectivity icon on the
top, then tap Disconnect.
Chapter 5 — Network Support
148 CN3 Mobile Computer User’s Manual
The iFTP menu is available the next time you start iConnect.
To manage the state of the FTP server
Modify these existing registry keys:
HKEY_CURRENT_USER\Software\iConnect2\IConnect\Settings\FtpAutoStart
HKEY_CURRENT_USER\Software\iConnect2\IConnect\Settings\FtpHeartbeat
where 1 = enable and 0 = disable.
Network Interfaces
The default network adapter or radio is dependent on what radios are
installed in your CN3. With the iConnect menu, using the Enable feature,
you can specify “Wireless” or “No Networking” to load onto your CN3
when a cold-boot is performed.
If you had specified a network prior to when a warm-boot is performed on
the CN3, the iConnect application restores your network interfaces to what
they were before the warm-boot was performed.
See the Developer’s Support area of the Intermec web site for the latest
information on network adapters for your CN3.
To access the iConnect menu
Select Dismiss from the iConnect menu to end the session without
exiting the application.
Select Exit iConnect to exit the application.
To access the iConnect application after you have exited it
Perform a warm-boot on the CN3. The iConnect icon then reappears
above the command bar.
No Networking
To disable the networking interface
Select Enable > No Networking from the iConnect menu.
The Wireless radio tower icon is replaced with one that shows an “X,” a
check mark appears next to the “No Networking” option in the menu, and
the iConnect application disables all other networking interfaces.
Wireless Communications
To enable wireless communications on the CN3
Select Enable > Wireless from the iConnect menu.
•Tap the iConnect icon (shown to the left) above your command bar.
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual 149
The Wireless icon (shaped like a radio tower) appears in the toolbar, a
check mark appears next to the “Wireless” option in the menu, and wireless
communications is enabled.
To configure wireless communications on the CN3
Select Tools > Wireless Settings from the iConnect menu to access the
Profile Wizard for the 802.11b/g radio module.
To configure wireless 802.11b/g communications using the Profile Wizard
To view information about the Wireless 802.11b/g communications
Select Tools > Wireless IP Settings from the iConnect menu for the
following:
To view the status of the Wireless communications
Select Status > Wireless from the iConnect menu to view the status. Tap
Tr y A gain to check the status after you make changes to the connection.
Ping Test
To test the connection of your CN3 against your network
Select Tools > Ping Test from the iConnect menu.
To ping your gateway or DHCP server
Select Ping my gateway or DHCP server, then select which to ping
from the top drop-down list.
•Tap Start > Settings > the System tab > the Wireless Network icon to
access the Profile Wizard. Go to “Configuring Microsoft Security” on
page 175 for information.
Chapter 5 — Network Support
150 CN3 Mobile Computer User’s Manual
To ping a specific host
Select Ping the host address below, then enter its IP address in the field
beneath. After you make your selection, tap Ping! and wait for results.
ISpyWiFi
The ISpyWiFi utility provides more detailed information for the 802.11
radio connection in your CN3, such as MAC address, access point
information, association, encryption, power management, antenna status,
RSSI, data link rates, and supplicant status.
With the utility, you can scan for access points in your network and ping
for detailed and illustrated information.
Starting the Utility
The ISpyWiFi utility is installed in your CN3 as an executable. You can
either start the utility using File Explorer or create a shortcut with which to
start the utility from the CN3 desktop.
To start the ISpy WiFi utility via File Explorer
To place the ISpyWiFi utility in the Programs group
1Press and hold your stylus on the ISpyWifi executable for its pop-up
menu, then select Copy.
2Scroll up to the “\Start Menu\Programs” folder, then tap it to open.
1Tap Start > Programs > the File Explorer icon.
2Tap the “\Windows” folder from the root.
3Scroll down for, then double-click the ISpyWifi executable.
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual 151
3Press and hold your stylus in an empty (white) area in the folder, for its
pop-up menu, then select Paste Shortcut.
To use the ISpyWiFi tab
The ISpyWiFi tab contains network interface, configuration, access point,
and radio frequency information:
4Close the File Explorer, select Start > Programs to locate the Shortcut to
ISpyWifi icon. Tap this icon to access the ISpyWifi application. Note
that this icon is temporary.
WiFi NIC (Network Interface Card)
BCMCF1 A WLAN adapter and its associated driver version
MAC The client radio MAC address
IP(DHCP) The IP address of the client radio, if using DHCP
IP (Static) The IP address of the client radio, if using a static IP address
Chapter 5 — Network Support
152 CN3 Mobile Computer User’s Manual
To use the WiFi Scan tab
Use the WiFi Scan tab to scan your network and bring back information
about any access points with which you can communicate. See “Wireless
Network” on page 182 for information on connecting with a network.
Tap Scan, then wait for the table to fill with information. Tap any of the
columns to sort by ascending or descending order. Tap the slider bar on the
bottom to scroll left and right to view all of the information.
AP
Status Shows whether the radio is associated with the access point
Channel The channel on which the radio is communicating with the access point
ESSID The text SSID (Network Name) for your network
BSSID MAC address of radio AP with which the client radio is communicating
Config
Association Shows one of the following types:
Open, WPA, WPA-PSK, WPA2, Network EAP
Note that more information about these types start on page 183.
Encrypt Shows potential encryptions for the association shown:
Key Absent/WEP, TKIP, Key Absent, TKIP/AES, WEP
Power CAM (Constantly Awake Mode) or FAST PSP (Power Save Poll)
Antenna Diversity (multiple antennas), Primary (one antenna)
RF
TX Power Transmit power level in milliwatts (mW).
RSSI The Received Signal Strength Indicator. The closer to zero, the better.
For example: -40dBm is excellent, while -60dBm is good.
Link The data rate at which the radios are communicating
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual 153
SSID displays the broadcast range from the access point.
Signal shows the RSSI seen from the access point.
Channel lists the channel on which client radio is communicating with
access point.
BSSID displays the MAC address for the access point radio
When Privacy shows a “Y,” WEP, TKIP, or AES encryption is used; an
“N” indicates that no encryption is used.
To use the Supplicant tab
The Supplicant tab provides you with security and authentication
information configured elsewhere in the CN3. See “Configuring Security
on page 156 for setting up Funk and Microsoft security.
Security and Authentication Information
Status Description
Service Status ON: Intermec Funk Security is enabled
OFF: Microsoft Security is enabled
Starting Up:
Shutting Down:
Unknown/Undefined:
Authentication State authenticated: Authentication Server successful
authentication failed: Previous authentication attempt failed
disconnected: No authentication used, Open or Static WEP connection used
acquired: Access point located, authentication process not initiated
authenticating: Attempting authentication with Authentication Server
logoff: Current session terminated by supplicant
unknown: Error occurred, but not defined
Authentication Result success: Authentication successful
time-out: Authentication Server not responding to requests, may be out of range
no credentials: Proper credentials not configured in device
client reject: Unable to validate access point certificate
server reject: Authentication Server rejects submitted credentials
unknown: No authentication used or in the process of authentication
Supplicant Events Displays output from the supplicant detailing its status.
Intermec Supplicant Version Version of Intermec Funk Security in the CN3
Chapter 5 — Network Support
154 CN3 Mobile Computer User’s Manual
Click Configure Profile to launch the Profile Wizard and configure
802.11 options. See “Using the Profile Wizard” on page 161 for
information on configuring this wizard.
Click Reconnect to disassociate the radio, momentarily dropping its
connection. The radio then reassociates and reauthenticates, but does
not do anything with the radio driver.
Click Clear Events to remove the information shown in the Supplicant
Event box.
Pinging
Use the Ping tab to contact with any host in your network for information.
To ping a host
1From the Host drop-down list, select an IP address for the host you want
to ping. Enter a new IP address using the input panel or the keypad.
Select Clear List to remove all the IP addresses from the drop-down list.
2From the Repetitions drop-down list, select the number of times to ping
the selected host. These repetitions are done once per second.
3Tap Ping to initiate contact with the selected host.
Ping Information
Status Description
Timing Statistics Min: The shortest ping reply in milliseconds (ms)
Max: The maximum ping reply in milliseconds
Avg: The average ping reply time
Count: The number of pings already completed
Timeouts: The number of pings that did not receive a response
BSSID The MAC address for the access point radio
Channel The channel on which the access point is communicating
RSSI The RSSI seen on the access point
Link The speed at which the last ping occurred
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual 155
4Depending on how the screen is set up, you can toggle between a graph
and a list of ping results:
•Tap Graph to toggle to the graphical view of 25 of the most recent
pings and their response results, like in the following sample graph:
Note the size of the gray area represents the standard deviation from the mean.
•Tap List to toggle to detailed information showing what ping touched
what host and its RTT (Round Trip Time).
Logging Supplicants
If you reach a situation where you need to send in debug information to
Intermec Product Support or Intermec Engineering, you can use the
Intermec Funk Security logging feature.
To enable the logging feature
1Tap the Supplicant tab, then tap Configure Profile to access the Profile
Wizard.
2Tap Edit Selected Profile, then tap the Advanced tab.
3Check Enable Logging, tap ok to close the profile settings, then tap ok
to close the Profile Wizard.
Maximum ping
Last ping
Average ping
Minimum ping
Chapter 5 — Network Support
156 CN3 Mobile Computer User’s Manual
The debug output file is then stored in the “\My Device” root folder as a
text file called “uroddsvc.” Using File Explorer, press and hold your stylus
on this file for its pop-up menu, then select any of its options to copy,
beam, send, or delete this file.
Configuring Security
The CN3 provides three types of security for your wireless network:
Wi-Fi Protected Access 2 (WPA2/802.11i)
•WPA
WEP. 802.1x (should be referred to as an authentication method used for
WPA and WPA2)
Another authentication method for WPA and WPA2 would be the Pre-
Shared Key (PSK).
Intermec recommends that you use Intermec Settings to configure your
security. For help, see the Intermec Computer Command Reference Manual
(P/N 073529) available online at www.intermec.com.
Choosing Between Microsoft and Funk Security
Before you can implement a security solution on the CN3, you need to
choose between Microsoft and Funk security:
By default, Funk security is enabled. It provides everything you get with
Microsoft security plus Cisco Compatible Extensions features. It also
provides additional authentication types like EAP-TTLS, LEAP, and
EAP-FAST.
Microsoft security, with its Microsoft Zero Config feature, is also
available. To switch to Microsoft security, go to “Configuring Microsoft
Security” on page 175 to start.
Configuring Funk Security
You can define up to four profiles for your Funk security. Different profiles
let your CN3 communicate in different networks without having to change
all of your security settings. For example, you can set up one profile for the
manufacturing floor and one for the warehouse.
Note: Your security choice does not depend on your authentication server.
For example, you can choose Funk security if you use Microsoft Active
Directory® to issue certificates.
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual 157
To configure Funk Security
Using WPA Security
Wi-Fi Protected Access (WPA) is a strongly enhanced, interoperable Wi-Fi
security that addresses many of the vulnerabilities of Wired Equivalent
Privacy (WEP). Instead of WEP, WPA uses Temporal Key Integrity
Protocol (TKIP) for its data encryption method. Currently, WPA satisfies
IEEE 802.11i standards.
WPA runs in Enterprise (802.1x) mode or PSK mode:
In Enterprise mode, WPA provides user authentication using 802.1x and
the Extensible Authentication Protocol (EAP). That is, an authentication
server (such as a RADIUS server) must authenticate each device before
the device can communicate with the wireless network.
In PSK mode, WPA provides user authentication using a shared key
between the authenticator and the CN3. WPA-PSK is a good solution
for small offices or home offices that do not want to use an
authentication server.
To use WPA security, you need an access point with an 802.11b/g radio
that supports WPA.
1Select Start > Settings > the System tab > the Intermec Settings icon.
2Tap (+) to expand Communications > 802.11 Radio > Funk Security.
3Select an active profile, then configure its security settings.
Chapter 5 — Network Support
158 CN3 Mobile Computer User’s Manual
Configuring WPA Security With Funk Security
Use this procedure to set WPA security with Funk security.
1Make sure you have configured the communications and radio
parameters on your CN3 and that Funk is your security choice.
2Open Intermec Settings. Tap (+) to expand Communications > 802.11
Radio > Funk Security > Profile X with “X” being “1” through “4.
3For Association, select “WPA” and press Enter.
4For 8021x, select “PEAP,” “TLS,” “TTLS,” “LEAP,” or “EAP-FAST” and
press Enter.
If you select “TTLS” or “PEAP:”
aSelect User Name, type your user name, then press Enter.
bSelect User Password, type a user password, then press Enter.
cFor Validate Server Certificate, select “Yes,” then press Enter. Note
that you must have the date on the CN3 set correctly when you enable
Validate Server Certificate.
dYou must enter a User Name and Subject Name. You can also enter a
Server 1 Common name or Server 2 Common name if you want to
increase your level of security.
If you select “TLS:”
aLoad a user and root certificate on your CN3. For help, see “Loading
Certificates” on page 182.
bFor Validate Server Certificate, select “Yes,” then press Enter. Note
that you must have the date on the CN3 set correctly when you enable
Validate Server Certificate.
cYou must enter a User Name and Subject Name. You can also enter a
Server 1 Common name or Server 2 Common name if you want to
increase your level of security.
If you select “LEAP” or “EAP-FAST:”
aSelect User Name, type your user name, then press Enter.
bSelect User Password, type a user password, then press Enter.
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual 159
Configuring WPA-PSK Security With Funk Security
1Make sure you have configured the communications and radio
parameters on your CN3 and that Funk is your security choice.
2Open Intermec Settings. Tap (+) to expand Communications > 802.11
Radio > Funk Security > Profile X with “X” being “1” through “4.
3For Association, select “WPA” and press Enter.
4For 8021x, select “None” and press Enter.
5For Pre-Shared Key, enter the pre-shared key or the passphrase.
The pre-shared key must be a value of 32 hex pairs preceded by 0x for a
total of 66 characters. The value must match the key value on the access
point. The passphrase must be from 8 to 63 chtomaracters. After you
enter a passphrase, the CN3 internally converts it to a pre-shared key.
This value must match the passphrase on the authenticator.
6Exit Intermec Settings.
Using 802.1x Authentication
802.1x authentication provides centralized user authentication using an
authentication server, authenticators (access points), and supplicants. These
components communicate using an EAP authentication type, such as TLS
(Transport Layer Security) or PEAP (Protected Extensible Authentication
Protocol). 802.1x security provides data encryption using dynamic WEP
key management. To use 802.1x security, you need:
An access point with an 802.11b/g radio.
A CN3 with an 802.11b/g radio and the 802.1x/WPA security option.
Chapter 5 — Network Support
160 CN3 Mobile Computer User’s Manual
Configuring 802.1x Security With Funk Security
1Make sure you have configured the communications and radio
parameters on your CN3 and that Funk is your security choice.
2Open Intermec Settings. Tap (+) to expand Communications > 802.11
Radio > Funk Security > Profile X with “X” being “1” through “4.
3For Association, select “Open” and press Enter. When working with
Cisco Aironet access points, you can select “Network-EAP.
4For Encryption, select “WEP” and press Enter.
5For 8021x, select “PEAP,” “TLS,” “TTLS,” “LEAP,” or “EAP-FAST” and
press Enter.
If you select “TTLS” or “PEAP
aSelect User Name, type your user name, then press Enter.
bSelect User Password, type a user password, then press Enter.
cFor Validate Server Certificate, select “Yes,” then press Enter. Note
that you must have the date on the CN3 set correctly when you enable
Validate Server Certificate.
dEnter a User Name and Subject Name. You can also enter a Server 1
Common name or Server 2 Common name to increase security.
If you select “TLS”
aLoad a user and root certificate on your CN3 (page 182).
bFor Validate Server Certificate, select “Yes,” then press Enter. Note
that you must have the date on the CN3 set correctly when you enable
Validate Server Certificate.
cYou must enter a User Name and Subject Name. You can also enter a
Server 1 Common name or Server 2 Common name if you want to
increase your level of security.
If you select “LEAP” or “EAP-FAST”
Select User Name, then type your user name. press Enter, select User
Password, type a user password, then press Enter.
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual 161
Using Static WEP Security
The CN3 uses the Wired Equivalent Privacy (WEP) protocol to add
security to your wireless network based on the 802.11b/g standard. To use
WEP security, you need an access point with an 802.11b/g radio.
Configuring Static WEP Security With Funk Security
Use this procedure to set Static WEP security with Funk security.
1Make sure you have configured the communications and radio
parameters on your CN3 and that Funk is your security choice.
2Open Intermec Settings. Tap (+) to expand Communications > 802.11
Radio > Funk Security > Profile X with “X” being “1” through “4.”.
3For Association, select “Open” and press Enter.
4For Encryption, select “WEP” and press Enter.
5For 8021x, select “None” and press Enter.
7For Tr a n sm it key, select which WEP key to use for encryption of
transmitted data.
8Define a value for each key, up to four. Enter an ASCII key or a hex key
either 5 or 13 bytes long based on the radio capability. Set a 5-byte value
for 64-bit WEP or a 13-byte value for 128-bit WEP. Precede hex keys
with 0x and make sure the keys use 5 or 13 hex pairs.
Using the Profile Wizard
A profile contains all the information necessary to authenticate you to the
network, such as login name, password or certificate, and protocols by
which you are authenticated.
You can have up to four profiles for different networks. For example, you
may have different login names or passwords on different networks, or you
may use a password on one network, and a certificate on another.
To start 802.11b/g communications on the CN3, tap Start > Settings > the
System tab > the Wireless Network icon to access the Profile Wizard for the
802.11b/g radio module.
Chapter 5 — Network Support
162 CN3 Mobile Computer User’s Manual
Use the Profiles page to select and configure between the networking
environments assigned to this 802.11b/g radio.
•Tap the Profile drop-down list to choose between four different profiles
assigned to this CN3, then tap Edit Select Profile, make the changes
needed for this profile (starting on the next page), then tap ok to return
to the Profiles page.
Check Enable Microsoft’s Wireless Zero Config to enable Microsoft's
Wireless Zero Config application and disable the Intermec software
solution for 802.11b/g, including configuration via the Wireless
Network applet.
Basic
Use the Basic page to set the network type, name, and manage battery
power for this profile. Tap ok to return to the Profiles page.
Enter a unique Profile Label name for your profile.
•Tap the Network type list to select “Infrastructure” if the network uses
access points to connect to the corporate network or internet; or
Ad-Hoc” to set up a private network with one or more participants.
If you select “Ad-Hoc” for the network type, select the Channel on
which you are communicating with others in your network. There are up
to 11 channels available.
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual 163
SSID (Network Name) assumes the profile name unless another name is
entered in this field. If you want to connect to the next available network
or are not familiar with the network name, enter “ANY" in this field.
Consult your LAN administrator for network names.
Check Enable Power Management to conserve battery power (default),
or clear this box to disable this feature.
Security
These are available from the 8021x Security drop-down list: None, PEAP
(page 165), TLS (page 167), TTLS (page 168), LEAP (page 171), and
EAP-FAST (page 172).
To disable 802.1x security and enable WEP encryption
1Set 8021x Security as “None.
2Set Association to “Open.
3Set Encryption to “None.
To enable WEP encryption
1Set 8021x Security as “None” and Association to “Open” or “Shared” as
required to match the settings in your access point. “Open” is the
recommended choice as “Shared” key authentication has security
weaknesses.
2Set Encryption to “WEP.
3Select a data transmission key from the Data TX Key drop-down list
near the bottom of this screen.
Chapter 5 — Network Support
164 CN3 Mobile Computer User’s Manual
4Enter an ASCII key or a hex key either 5 or 13 bytes long based on the
radio capability in the appropriate Key # field. Set a 5-byte value for 64-
bit WEP or a 13-byte value for 128-bit WEP. Precede hex keys with 0x
and make sure the keys use 5 or 13 hex pairs.
To enable WPA encryption using a pre-shared key
1Set 8021x Security as “None.
2Set Association to “WPA.
3Enter the passphrase as ASCII (12345) in the Pre-Shared Key field.
To enable WPA2 encryption using a preshared key
1Set 8021x Security as “None.
2Set Association to “WPA2.
3Set Encryption to either “TKIP” or “AES.
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual 165
4Enter the passphrase as ASCII (12345) in the Pre-Shared Key field.
PEAP (Protected EAP)
This protocol performs secure authentication against Windows domains
and directory services. It is comparable to EAP-TTLS (see page 168), both
in its method of operation and its security, though not as flexible. This does
not support the range of inside-the-tunnel authentication methods
supported by EAP-TTLS. Microsoft and Cisco both support this protocol.
Use “PEAP” to configure the use of PEAP as an authentication protocol
and to select “Open,” “WPA,” “WPA2,” or “Network EAP” as an
association mode.
To configure with PEAP
1Set 8021x Security as “PEAP,” then choose any of the following:
•Set Association to “Open.
•Set Association to “WPA.
•Set Association to “WPA2” and Encryption to “TKIP” or “AES.
•Set Association to “Network EAP” and Encryption to either “WEP”
or “CKIP.
2Enter your unique Username and password to use this protocol.
Chapter 5 — Network Support
166 CN3 Mobile Computer User’s Manual
3Select Prompt for password to have the user enter this password each
time to access the protocol; or leave Use following password as selected
and enter your unique password to use the protocol without entering a
password each time you use your CN3.
4Tap Get Certificates to obtain or import server certificates (page 170).
5Tap Additional Settings to assign an inner PEAP authentication and set
options for server certificate validation and trust.
To configure additional PEAP settings
1Select a method from the Inner PEAP Authentication drop-down list.
2Check Validate Server Certificate to verify the identity of the
authentication server based on its certificate when using PEAP.
3Tap Root CA, select a root certificate, then OK to close.
4Enter the Common Names of trusted servers. If these fields are left
blank, the client will accept any authentication server with a valid
certificate. For increased security, you should specify exactly which
authentication servers you expect to use.
5Tap ok to return to the Security page.
PEAP Authentication Methods
Method Description
EAP/MS-CHAP-V2 Authenticates against a Windows Domain Controller and
other non-Windows user databases. This is Microsoft's
implementation of PEAP.
EAP/Token Card Use with token cards. The password value entered is never
cached. This is Cisco's implementation of PEAP.
EAP/MD5-Challenge Message Digest 5. A secure hashing authentication
algorithm.
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual 167
TLS (EAP-TLS)
EAP-TLS is a protocol that is based on the TLS (Transport Layer Security)
protocol widely used to secure web sites. This requires both the user and
authentication server have certificates for mutual authentication. While
cryptically strong, this requires corporations that deploy this to maintain a
certificate infrastructure for all their users.
Use “TLS” to configure using EAP-TLS as an authentication protocol, pick
“Open,” “WPA,” “WPA2,” or “Network EAP” as an association mode.
To configure TLS settings
1Set 8021x Security as “TLS, then choose any of the following:
•Set Association to “Open.
•Set Association to “WPA.
•Set Association to “WPA2” and Encryption to “TKIP” or “AES.
•Set Association to “Network EAP” and Encryption to either “WEP”
or “CKIP.
2Enter your unique Subject Name and User Name of the corresponding
certificate installed on your CN3 to use this protocol.
3Tap Get Certificates to obtain or import server certificates (page 170).
4Tap Additional Settings to set server certificate validation and trust.
To configure additional TLS settings
1Check Validate Server Certificate to verify the identity of the
authentication server based on its certificate when using TLS.
2Tap Root CA, select a root certificate, then tap OK to return to the TLS
settings.
3Enter the Common Names of trusted servers. If these fields are left
blank, the client will accept any authentication server with a valid
certificate. For increased security, you should specify exactly which
authentication servers you expect to use.
Chapter 5 — Network Support
168 CN3 Mobile Computer User’s Manual
4Tap ok to return to the Security page.
TTLS (EAP-Tunneled TLS)
This protocol provides authentication like EAP-TLS (see page 167) but
does not require user certificates. User authentication is done using a
password or other credentials that are transported in a securely encrypted
tunnel” established using server certificates.
EAP-TTLS works by creating a secure, encrypted tunnel through which
you present your credentials to the authentication server. Thus, inside EAP-
TTLS there is another inner authentication protocol that you must
configure via Additional TTLS Settings.
Use “TTLS” to configure EAP-TTLS as an authentication protocol, select
“Open,” “WPA,” “WPA2,” or “Network EAP” as an association mode.
To configure TTLS settings
1Set 8021x Security as “TTLS,” then choose one of the following:
•Set Association to “Open.” (default configuration)
•Set Association to “WPA.
•Set Association to “WPA2” and Encryption to “TKIP” or “AES.
•Set Association to “Network EAP” and Encryption to either “WEP”
or “CKIP.
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual 169
2Enter your unique Username to use this protocol.
3Select Prompt for password to have the user enter this password each
time to access the protocol, or leave Use following password as selected
and enter your unique password to use the protocol without entering a
password each time you use your CN3.
4Tap Get Certificates to obtain or import server certificates (page 170).
5Tap Additional Settings to assign an inner TTLS authentication and an
inner EAP, and set the server certificate validation and trust.
To configure additional TTLS settings
1Select an authentication method from the Inner TTLS Authentication
drop-down list.
2If you select “EAP” for the inner authentication protocol, then select an
inner EAP protocol from the Inner EAP drop-down list.
3Enter the Common Names of trusted servers. If these fields are left
blank, the client will accept any authentication server with a valid
certificate. For increased security, you should specify exactly which
authentication servers you expect to use.
4Check Validate Server Certificate to verify the identity of the
authentication server based on its certificate when using TTLS.
5Tap Root CA, select a root certificate, then tap OK to return to the
Inner TTLS Authentication.
TTLS Authentication Methods
Method Description
PAP Password Authentication Protocol. A simple
authentication protocol that sends security information in
the clear.
CHAP Challenge Handshake Authentication Protocol. Use of
Radius to authenticate a terminal without sending security
data in the clear. Authenticates against non-Windows user
databases. You cannot use this if authenticating against a
Windows NT Domain or Active Directory.
MS-CHAP;
MS-CHAP-V2
Authenticates against a Windows Domain Controller and
other non-Windows user databases.
PAP/Token Card Use with token cards. The password value entered is never
cached.
EAP Extensible Authentication Protocol
Chapter 5 — Network Support
170 CN3 Mobile Computer User’s Manual
6Enter the Anonymous EAP-TTLS Name as assigned for public usage.
Use of this outer identity protects your login name or identity. Tap ok.
Getting Certificates
Certificates are pieces of cryptographic data that guarantee a public key is
associated with a private key. They contain a public key and the entity
name that owns the key. Each certificate is issued by a certificate authority.
Use these fields for batch importing certificates into the Microsoft
certificate store. You can also use these fields to remotely import certificates
onto the CN3 using the SmartSystems Console. However, you must make
sure all the certificate files are downloaded to the appropriate folders on the
CN3 before you invoke the call through the SmartSystems Console.
Importing Root Certificates
Setting this field to “True” imports root certificates located in the
“\Temp\Root” folder on the CN3 into the Microsoft Root certificate store.
The certificates should be DER-coded and have a .cer file extension. The
certificate files are deleted from the CN3 after they import to the store. If
there are no certificate files to import, this action fails.
To import root certificates
1Tap the <<< button next to the Import Root Certificate field to select
the root certificate (DER-encoded .cer file) to import.
2Click Import Root Cert to install the selected certificate.
Importing User Certificates
Setting this field to “True” imports user certificates located in the
“\Temp\User” folder on the CN3 into the Microsoft personal certificate
store. The certificates must be provided in two files:
DER-encoded certificate that does not contain the .cer private key
base-64 encoded private key with the .pvk extension
Note: When you set either of the following fields to “True,” and the CN3
imports the requested certificates, the field toggles back to “False.” You
must reset the field to “True” before you can import more certificates.
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual 171
Both files must have the same name for the appropriate private key to
associate with the correct certificate, such as admin.cer and admin.pvk. The
certificate files are deleted from the CN3 after they import to the store. If
there are no certificates to import, this action fails.
To import user certificates
1Tap the <<< button next to the Certificate Path field to select the user
certificate (DER-encoded .cer file without the private key) to import.
2Tap the <<< button next to the Key Path field to select the .pvk private
key that corresponds to the user certificate chosen in step 1.
3Tap Import User Cert to install the selected certificate.
To obtain a user certificate
Tap Web Enrollment to obtain a user certificate over the network from an
IAS Server, then tap X to return to the Security page.
LEAP (Cisco Lightweight EAP)
LEAP is the Cisco Lightweight version of EAP.
Use “LEAP” to configure the use of LEAP as an authentication protocol,
select “Open,” “WPA,” “WPA2,” or “Network EAP” as an association
mode, or assign “Network EAP.
Chapter 5 — Network Support
172 CN3 Mobile Computer User’s Manual
To configure LEAP settings
1Set 8021x Security as “LEAP,” then choose one of the following:
•Set Association to “Open.
•Set Association to “WPA.
•Set Association to “WPA2” and Encryption to “TKIP” or “AES.
•Set Association to “Network EAP” and Encryption to either “WEP”
or “CKIP.” (default configuration)
2Enter your unique Username to use this protocol.
3Select Prompt for password to have the user enter this password each
time to access the protocol, or leave Use following password as selected
and enter your unique password to use the protocol without entering a
password each time you use your CN3.
EAP-FAST (EAP-Flexible Authentication via Secured Tunnel)
The EAP-FAST protocol is a client-server security architecture that
encrypts EAP transactions with a TLS tunnel. While similar to PEAP, it
differs significantly as EAP-FAST tunnel establishment is based on strong
secrets unique to users. These secrets are called Protected Access Credentials
(PACs), which CiscoSecure ACS generates using a master key known only
to CiscoSecure ACS. Because handshakes based upon shared secrets are
intrinsically faster than handshakes based upon PKI, EAP-FAST is the
significantly faster of the two solutions that provide encrypted EAP
transactions. No certificate management is required to implement
EAP-FAST.
Use “EAP-FAST” to configure EAP-FAST as an authentication protocol,
select “Open,” “WPA,” or “Network EAP” as an association mode.
To configure EAP-FAST settings
1Set 8021x Security as “EAP-FAST,” then choose one of the following:
•Set Association to “Open.
•Set Association to “WPA.
•Set Association to “WPA2.
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual 173
•Set Association to “Network EAP” and Encryption to either “WEP”
or “CKIP.
2Enter your unique Username to use this protocol.
3Select Prompt for password to have the user enter this password each
time to access the protocol, or leave Use following password as selected
and enter your unique password to use the protocol without entering a
password each time you use your CN3.
4Tap Additional Settings to set options for PAC management and assign
an anonymous EAP-FAST name.
To configure additional EAP-FAST settings
1Tap PAC Manager to view the PAC files currently installed on your
CN3. Tap ok to return to the Additional Settings screen.
2If you already have a PAC on your CN3, clear Allow Automatic PAC
provisioning to avoid receiving more PACs from the server.
3If Allow Automatic PAC provisioning is checked, you can check:
Prompt before acquiring a new PAC for notification of any
incoming PACs.
Prompt before replacing a PAC for notification whether to replace a
current PAC with an incoming PAC.
4Enter the Anonymous EAP-FAST Name as assigned for public usage.
This outer identity protects your login name or identity.
5Click ok to return to the Security page.
Chapter 5 — Network Support
174 CN3 Mobile Computer User’s Manual
Configuring Advanced Settings
Wireless NICs and APs associate based on the SSID configured for the
NIC. Given an SSID, the BSSID with the strongest signal is often
chosen for association. After association, 802.1x authentication may
occur and during authentication credentials to uniquely identify a user -
these are passed between the NIC and the AP.
Base 802.1x technology does not protect the network from “rogue APs.
These can mimic a legitimate AP to authentication protocols and user
credentials. This provides illegal users ways to mimic legitimate users and
steal network resources and compromise security.
Check Detect Rogue APs to detect and report client behavior suspected
of being rogue APs. Once a rouge AP is detected, your CN3 no longer
associates with that AP until you perform a clean boot.
Clear Detect Rogue APs to solve AP connection problems that result
when an AP gets put on the rogue list due to inadvertent failed
authentications, not because it is a real rogue.
Mixed cell is a profile-dependent setting. If Enable mixed cell is enabled
when you are using WEP, you can connect to access points that allow the
optional use of encryption.
When using a wireless LAN that uses Cisco Access Points, a LEAP-
enabled client device can roam from one access point to another without
involving the authentication (RADIUS) server. If Allow fast roaming
(CCKM) is enabled, an access point configured to provide Wireless
Domain Services (WDS) takes the place of the RADIUS server (caching
credentials of an initial authentication with the RADIUS server) and
authenticates the client without perceptible delay in voice or other time-
sensitive applications.
Check Enable Logging to log what activity occurs for this profile.
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual 175
Configuring Microsoft Security
The default security setting is Funk. If you want to use Microsoft security,
you need to select it as your security choice.
Intermec recommends that you use Intermec Settings to configure your
security. For more information, see the Intermec Computer Command
Reference Manual.
To enable Microsoft Security
3Select “Microsoft Security” from the drop-down list, then press Enter.
4Tap Yes or press Esc to clear the alert box, save your settings, then
perform a clean boot on the CN3. See “Clean Boot Process” on page 5
for more information on performing a clean boot.
You can configure Microsoft Settings using Intermec Settings. However,
with Intermec Settings, you cannot detect preferred networks (networks
already configured), and WPA2-PSK is not provided.
When Microsoft Security is enabled, you can use the Wi-Fi applet to
configure your preferred networks. See “Configuring Preferred Networks
on page 177 for more information.
1Select Start > Settings > the System tab > the Intermec Settings icon.
2Tap (+) to expand Communications > 802.11 Radio > Security
Choice.
Chapter 5 — Network Support
176 CN3 Mobile Computer User’s Manual
To configure Microsoft Security using Intermec Settings
1Tap (+) to expand Communications > 802.11 Radio > Microsoft
Security.
2Select Network name (SSID) and enter the SSID.
To connect to an ad-hoc connection
•Set Infrastructure Mode to “Ad hoc”.
To disable WEP encryption
•Set Network Authentication to “Open” if WEP keys are not
required; or “Shared” when WEP keys are required.
•Set Data Encryption to “Disabled”.
To enable WEP encryption
•Set Network Authentication to either “Open” if WEP keys are not
required; or “Shared” when WEP keys are required for association.
•Set Data Encryption to “WEP.
If you need to change the network key, set Network Key Setting to
“Enter Key and Index”, enter the new key in Network Key Value, and
select the appropriate index under Network Key Index.
To enable WPA authentication
•Set Network Authentication to “WPA.
To enable WPA authentication using a preshared key
•Set Network Authentication to “WPA-PSK,” then enter a new
network key under Pre-Shared Key.
3Select File > Save Settings to set the changes made.
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual 177
Configuring Preferred Networks
Networks already configured are preferred networks. You can connect to
only preferred networks or search for and connect to any available network.
A wireless network can be added either when the network is detected, or
manually by entering settings information. To determine if authentication
information is needed, see your network administrator.
To add a wireless network
2Enter a Network name. If the network was detected, the network name
is entered and cannot change.
3From Connects to, select to what your network is to connect. If you
select “Work,” you can do a VPN connection or use proxy servers. If you
select “The Internet, you can connect directly to the internet.
4Select This is a device-to-device (ad-hoc) connection to connect to an
ad-hoc connection.
1Tap Start > Settings > the Connections tab > the Wi-Fi icon , then tap
Add New . . .
Chapter 5 — Network Support
178 CN3 Mobile Computer User’s Manual
5Do one of the following:
To disable WEP encryption
•Set Authentication to either “Open” if WEP keys are not required; or
“Shared” when WEP keys are required for association.
•Set Data Encryption to “Disabled.
To enable WEP encryption
•Set Authentication to either “Open” if WEP keys are not required; or
“Shared” when WEP keys are required for association.
•Set Data Encryption to “WEP.
•Clear The key is automatically provided, then enter the new
Network key and select the appropriate Key index to change the
network key.
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual 179
To enable WPA authentication
•Set Authentication to “WPA.
•Set Data Encryption to either “AES” or “TKIP.
Enter the new Network key.
To enable WPA authentication using a preshared key
•Set Authentication to “WPA-PSK.
•Set Data Encryption to either “AES” or “TKIP.
Enter the new Network key.
Chapter 5 — Network Support
180 CN3 Mobile Computer User’s Manual
To enable WPA2 authentication
•Set Authentication to “WPA2.
•Set Data Encryption to either “AES” or “TKIP.
Enter the new Network key.
To enable WPA2 authentication using a preshared key
•Set Authentication to “WPA2-PSK.
•Set Data Encryption to either “AES” or “TKIP.
Enter the new Network key.
6Tap Next, select either “PEAP” or “Smart Card or Certificate” for the
EAP type, then tap Properties to adjust its settings.
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual 181
7Tap Finish to return to the Configure Wireless Network screen.
8From the Networks to access drop-down list, select “All Available,
“Only access points,” or “Only computer-to-computer” depending on
the type of networks to which you connect. Tap ok to close this screen.
Note: If you select to connect to non-preferred networks, your CN3 detects
any new networks and provides configuration opportunities.
Chapter 5 — Network Support
182 CN3 Mobile Computer User’s Manual
Loading Certificates
If you choose to use Transport Layer Security (TLS) with WPA or 802.1x
security, you need to have a unique client certificate on the CN3 and a
trusted root certificate authority (CA) certificate. If you choose to use
PEAP, you need to load a root CA certificate. You can use a third-party CA
to issue unique client certificates and a root certificate.
To load certificates
Wireless Network
Your wireless adapter (network interface card) connects to wireless networks
of two types: infrastructure networks and ad-hoc networks.
Infrastructure networks get you onto your corporate network and the
internet. Using the 802.11b/g infrastructure mode, the CN3 establishes
a wireless connection to an access point, linking you to the rest of the
network.
Ad-hoc networks are private networks shared between two or more
clients, even with no access point.
Each wireless network is assigned a name (or Service Set Identifier - SSID)
to allow multiple networks to exist in the same area without infringement.
Intermec recommends using security measures with wireless networks to
prevent unauthorized access to your network and to ensure your privacy of
transmitted data. Authentication (cryptographically protected) by both the
network and the user, transmitted data, and encryption are required
elements for secure networks. Schemes are available to implement the
features.
If your CA is on your WLAN, select Start > Settings > the System tab >
the Certificates icon > the Root tab to view certificate details.
Press and hold a certificate, then select Delete to remove a certificate.
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual 183
Encryption
AES (Advanced
Encryption Standard)
A block cipher, a type of symmetric key cipher that uses groups of bits of a fixed length -
called blocks. A symmetric key cipher is a cipher using the same key for both encryption
and decryption.
As implemented for wireless, this is also known as CCMP, which implements AES as TKIP
and WEP are implementations of RC4.
CKIP (Cisco Key
Integrity Protocol)
This is Cisco's version of the TKIP protocol, compatible with Cisco Aironet products.
TKIP (Temporal Key
Integrity Protocol)
This protocol is part of the IEEE 802.11i encryption standard for wireless LANs., which
provides per-packet key mixing, a message integrity check and a re-keying mechanism,
thus overcoming most of the weak points of WEP. This encryption is more difficult to
crack than the standard WEP. Weak points of WEP include: No Initiation Vector (IV)
reuse protection, weak keys, no protection against message replay, no detection of message
tampering, and no key updates.
WEP (Wired Equivalent
Privacy) encryption
With preconfigured WEP, both the client CN3 and access point are assigned the same key,
which can encrypt all data between the two devices. WEP keys also authenticate the CN3
to the access point - unless the CN3 can prove it knows the WEP key, it is not allowed
onto the network. WEP keys are only needed if they are expected by your clients. There are
two types available: 64-bit (5-character strings, 12345) (default) and 128-bit (13-character
strings, 1234567890123). Enter these as either ASCII (12345) or Hex (0x3132333435).
Key Management Protocols
WPA (Wi-Fi Protected
Access)
This is an enhanced version of WEP that does not rely on a static, shared key. It
encompasses a number of security enhancements over WEP, including improved data
encryption via TKIP and 802.11b/g authentication with EAP. WiFi Alliance security
standard is designed to work with existing 802.11 products and to offer forward
compatibility with 802.11i.
WPA2 (Wi-Fi Protected
Access)
Second generation of WPA security. Like WPA, WPA2 provides enterprise and home Wi-
Fi users with a high level of assurance that their data remains protected and that only
authorized users can access their wireless networks. WPA2 is based on the final IEEE
802.11i amendment to the 802.11 standard ratified in June 2004. WPA2 uses the
Advanced Encryption Standard (AES) for data encryption and is eligible for FIPS (Federal
Information Processing Standards) 140-2 compliance.
Authentication
EAP (Extensible
Authentication Protocol)
802.11b/g uses this protocol to perform authentication. This is not necessarily an
authentication mechanism, but is a common framework for transporting actual
authentication protocols. Intermec provides a number of EAP protocols for you to choose
the best for your network.
EAP-FAST (Flexible
Authentication via
Secure Tunneling)
A publicly accessible IEEE 802.1X EAP type developed by Cisco Systems. It is available as
an IETF informational draft. An 802.1X EAP type that does not require digital
certificates, supports a variety of user and password database types, supports password
expiration and change, and is flexible, easy to deploy, and easy to manage.
Chapter 5 — Network Support
184 CN3 Mobile Computer User’s Manual
LEAP (Lightweight
Extensible
Authentication Protocol)
Also known as Cisco-Wireless EAP, provides username/password based authentication
between a wireless client and a RADIUS server. In the 802.1x framework, traffic cannot
pass through a wireless network access point until it successfully authenticates itself.
EAP-PEAP (Protected
Extensible
Authentication Protocol)
Performs secure authentication against Windows domains and directory services. It is
comparable to EAP-TTLS both in its method of operation and its security, though not as
flexible. This does not support the range of inside-the-tunnel authentication methods
supported by EAP-TTLS. Microsoft and Cisco both support this protocol.
EAP-TLS (Transport
Layer Security)
Based on the TLS (Transport Layer Security) protocol widely used to secure web sites. This
requires both the user and authentication server have certificates for mutual
authentication. While cryptically strong, this requires corporations that deploy this to
maintain a certificate infrastructure for all their users.
EAP-TTLS (Tunneled
Tr a n s po r t L a ye r
Security)
This protocol provides authentication like EAP-TLS (see page 167) but does not require
certificates for every user. Instead, authentication servers are issued certificates. User
authentication is done using a password or other credentials that are transported in a
securely encrypted “tunnel” established using server certificates.
EAP-TTLS works by creating a secure, encrypted tunnel through which you present your
credentials to the authentication server. Thus, inside EAP-TTLS there is another inner
authentication protocol that you must configure via Additional TTLS Settings.
Authentication (continued)
Chapter 5 — Network Support
CN3 Mobile Computer User’s Manual 185
SmartSystems™ Foundation
Use the SmartSystems Foundation (www.intermec.com/SmartSystems) to
configure and manage your network. You can also contact your Intermec
representative for support.
This tool, available as a free download from Intermec, includes a
management console that provides a default method to configure and
manage Intermec devices “out-of-the-box,” without the purchase of
additional software licenses. This is for anyone who must configure and
deploy multiple devices or manage multiple licenses.
Use Intermec Settings to perform device configuration settings within the
SmartSystems Foundation. For more information, see the Intermec
Computer Command Reference Manual.
Information about the SmartSystems Foundation is available as an online
help within the SmartSystems Console application. Select SmartSystems >
Help in the console to access the manual.
Tap Start > Settings > the System tab > the Intermec Settings icon, then
tap to expand the SmartSystems Information option.
Chapter 5 — Network Support
186 CN3 Mobile Computer User’s Manual

Navigation menu