Intermec Technologies DRCB DRCB User Manual ck32um
Intermec Technologies Corporation DRCB ck32um
Contents
User Manual
User’s Manual CK32 I-Safe Handheld Computer User’s Manual CK32 I-Safe Handheld Computer Intermec Technologies Corporation Worldwide Headquarters 6001 36th Ave.W. Everett, WA 98203 U.S.A. www.intermec.com The information contained herein is provided solely for the purpose of allowing customers to operate and service Intermec-manufactured equipment and is not to be released, reproduced, or used for any other purpose without written permission of Intermec Technologies Corporation. Information and specifications contained in this document are subject to change without prior noticed and do not represent a commitment on the part of Intermec Technologies Corporation. © 2007 by Intermec Technologies Corporation. All rights reserved. The word Intermec, the Intermec logo, Norand, ArciTech, Beverage Routebook, CrossBar, dcBrowser, Duratherm, EasyADC, EasyCoder, EasySet, Fingerprint, i-gistics, INCA (under license), Intellitag, Intellitag Gen2, JANUS, LabelShop, MobileLAN, Picolink, Ready-to-Work, RoutePower, Sabre, ScanPlus, ShopScan, Smart Mobile Computing, SmartSystems, TE 2000, Trakker Antares, and Vista Powered are either trademarks or registered trademarks of Intermec Technologies Corporation. There are U.S. and foreign patents as well as U.S. and foreign patents pending. Wi-Fi is a registered certification mark of the Wi-Fi Alliance. Microsoft, Windows, and the Windows logo are registered trademarks of Microsoft Corporation in the United States and/or other countries. Bluetooth is a trademark of Bluetooth SIG, Inc., U.S.A. ii CK32 I-Safe Handheld Computer User’s Manual Contents Contents Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii Safety Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii Global Services and Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii Warranty Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii Web Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii Telephone Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix Who Should Read This Manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix Related Documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x Other Copyright Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x Patent Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi 1 Using the CK32 I-Safe Handheld Computer . . . . . . . . . . . . . . . .1 Introducing the CK32 I-Safe Handheld Computer. . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Using the Battery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Charging and Installing the Battery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Maximizing Battery Life . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Checking the Battery Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Understanding the Low Battery Warnings . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Using the Keypad . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Using the Color-Coded Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Capitalizing All Characters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Using the Power Button . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Understanding the Status Lights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Using the Touch Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Using the Stylus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Aligning the Screen. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 About the Audio System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Understanding the Audio Feedback. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Scanning Bar Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Enabling or Disabling Symbologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Scanning a Bar Code Label to Verify Scanner Operation . . . . . . . . . . . . . . 19 CK32 I-Safe Handheld Computer User’s Manual iii Contents 2 Understanding Windows Mobile . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Understanding Windows Mobile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Finding Information in Windows Mobile . . . . . . . . . . . . . . . . . . . . . . . . . Learning the Basic Skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Using the Today Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Accessing Programs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Closing an Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Using the Navigation Bar and the Command Bar. . . . . . . . . . . . Using Pop-Up Menus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Entering Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Using Transcriber . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Finding and Organizing Information . . . . . . . . . . . . . . . . . . . . . Customizing the CK32 I-Safe . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 24 25 25 26 26 26 27 27 29 30 30 Using Microsoft ActiveSync . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Using Internet Explorer Mobile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 3 Configuring the CK32 I-Safe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 Configuring the Operating Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 Configuring the CK32 I-Safe Using Intermec Settings . . . . . . . . . . . . . . . 36 Remotely Configuring the CK32 I-Safe Using SmartSystems Foundation . 37 Setting Up Ethernet Communications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 iv Setting Up Bluetooth Communications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Configuring Bluetooth Communications for Wireless Printing . . . . . . . . . Creating an Application That Lets You Print Wirelessly . . . . . . . Selecting the Current Wireless Printer on the CK32 I-Safe . . . . . Connecting to a Bluetooth Audio Device . . . . . . . . . . . . . . . . . . . . . . . . . 39 41 41 42 45 Setting Up 802.11 Radio Communications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Configuring the Network Parameters for a TCP/IP Network . . . . . . . . . . Configuring the Network Parameters for a UDP Plus Network. . . . . . . . . Checking the Status of Your Wireless Connection . . . . . . . . . . . . . . . . . . . Using ISpyWiFi. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Starting the Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ISpyWiFi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . WiFi Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Supplicant. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 46 47 47 48 48 49 51 52 54 CK32 I-Safe Handheld Computer User’s Manual Contents Supplicant Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 Configuring Security on the CK32 I-Safe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Understanding the Wireless Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Using WPA Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Using Static WEP Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 Using 802.1x Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Using LEAP Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Choosing Between Funk and Microsoft Security . . . . . . . . . . . . . . . . . . . . 60 Configuring Funk Security Using Intermec Settings . . . . . . . . . . 60 Configuring Funk Security Using the Profile Wizard . . . . . . . . . . 65 Configuring EAP-FAST with Profile Wizard . . . . . . . . . . . . . . . . 72 Configuring Microsoft Security . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Loading a Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 Disabling Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 4 Developing and Installing Applications . . . . . . . . . . . . . . . . . . . 81 Developing Applications for the CK32 I-Safe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 Developing a New Application Using the Intermec Developer Library . . . . 82 Developing a Web-Based Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 Converting a Trakker Antares Application for the CK32 I-Safe . . . . . . . . . 83 Installing Applications on the CK32 I-Safe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Installing Applications Using SmartSystems Foundation. . . . . . . . . . . . . . . 85 Installing Applications Using Microsoft ActiveSync . . . . . . . . . . . . . . . . . . 85 Installing Applications Using Wavelink Avalanche . . . . . . . . . . . . . . . . . . . 87 Launching An Application Automatically . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 RunAutoRun . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 AutoExec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 AutoRun. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 AutoCopy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 AutoReg . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 AutoCab. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 5 Troubleshooting and Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . 99 Upgrading the CK32 I-Safe Using SmartSystems . . . . . . . . . . . . . . . . . . . . . . . . . . 100 Contacting Product Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 Troubleshooting the CK32 I-Safe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 Problems While Operating the CK32 I-Safe . . . . . . . . . . . . . . . . . . . . . . . 104 CK32 I-Safe Handheld Computer User’s Manual Problems While Configuring Security . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 Problems with Wireless Connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 Resetting Your Computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Preferred Reset Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Secondary Reset Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Performing a Clean Boot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 110 110 111 Cleaning the Scanner Window, Screen, and Computer . . . . . . . . . . . . . . . . . . . . . 111 Cleaning the Scanner Window and Screen . . . . . . . . . . . . . . . . . . . . . . . 112 Cleaning the Handle and Computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 A Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 Physical and Environmental Specifications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Physical Dimensions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Weight . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Power Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Electrical Specifications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Temperature and Humidity Specifications . . . . . . . . . . . . . . . . LCD Touch Screen Specifications. . . . . . . . . . . . . . . . . . . . . . . Keypad Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Bar Code Symbologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Linear Imager Reading Distances . . . . . . . . . . . . . . . . . . . . . . . 116 116 116 116 116 116 116 117 117 118 Accessories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . AN1 Communications Adapter (P/N 871-223-xxx) . . . . . . . . . AC11 Quad Battery Charger (P/N 852-914-xxx) . . . . . . . . . . . Handle (P/N 714-625-xxx). . . . . . . . . . . . . . . . . . . . . . . . . . . . Hand Strap (P/N 825-183-xxx) . . . . . . . . . . . . . . . . . . . . . . . . Carrying Strap Kit (P/N 825-186-xxx) . . . . . . . . . . . . . . . . . . . AB6 Battery Pack (P/N 318-021-xxx) . . . . . . . . . . . . . . . . . . . . Tethered Stylus (P/N 203-828-xxx) . . . . . . . . . . . . . . . . . . . . . Battery Eliminator (P/N 714-619-xxx) . . . . . . . . . . . . . . . . . . . Power Supply (P/N 851-061-xxx). . . . . . . . . . . . . . . . . . . . . . . Screen Protector (P/N 346-065-004) . . . . . . . . . . . . . . . . . . . . 122 122 122 122 122 123 123 123 123 123 123 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 vi CK32 I-Safe Handheld Computer User’s Manual Before You Begin Before You Begin This section provides you with safety information, technical support information, and sources for additional product information. Safety Information Your safety is extremely important. Read and follow all warnings and cautions in this document before handling and operating Intermec equipment. You can be seriously injured, and equipment and data can be damaged if you do not follow the safety warnings and cautions. This section explains how to identify and understand dangers, warnings, cautions, and notes that are in this document. You may also see icons that tell you when to follow ESD procedures and when to take special precautions for handling optical parts. A warning alerts you of an operating procedure, practice, condition, or statement that must be strictly observed to avoid death or serious injury to the persons working on the equipment. A caution alerts you to an operating procedure, practice, condition, or statement that must be strictly observed to prevent equipment damage or destruction, or corruption or loss of data. Note: Notes either provide extra information about a topic or contain special instructions for handling a particular condition or set of circumstances. CK32 I-Safe Handheld Computer User’s Manual vii Before You Begin • The Intermec Models CK32 I-Safe, AB6 Battery Pack, AN1 Communications Adapter, and AC11 Battery Charger contain no user serviceable components. Return these models ONLY to Intermec Authorized Service Centers for Repair. Intrinsic Safety Certifications and Warranties will be void if these models are opened or serviced at locations not certified by Intermec. • Only Intermec provided spare parts should be used in the repair of the CK32 I-Safe and accessory products. • Immediately remove from service any product that exhibits physical damage. • Wired connections to the CK32 I-Safe must only be made through a model AN1 Communications Adapter. • Verify that the CK32 I-Safe is appropriately rated for your hazardous location before use. Consult your Safety Department for assistance. • Use of any accessories not supplied and approved by Intermec could compromise safety. Global Services and Support Warranty Information To understand the warranty for your Intermec product, visit the Intermec web site at www.intermec.com and click Service & Support > Warranty. Web Support Visit the Intermec web site at www.intermec.com to download our current manuals (in PDF). To order printed versions of the Intermec manuals, contact your local Intermec representative or distributor. Visit the Intermec technical knowledge base (Knowledge Central) at intermec.custhelp.com to review technical information or to request technical support for your Intermec product. viii CK32 I-Safe Handheld Computer User’s Manual Before You Begin Telephone Support These services are available from Intermec. Services Description Order Intermec • Place an order. products • Ask about an existing order. Order Intermec Order printer labels and media ribbons. Order spare Order spare parts. parts Technical Talk to technical support Support about your Intermec product. Service • Get a return authorization number for authorized service center repair. • Request an on-site repair technician. Service • Ask about an existing contracts contract. • Renew a contract. • Inquire about repair billing or other service invoicing questions. In the USA and Canada call 1-800755-5505 and choose this option 1 and then choose 2 1 and then choose 1 1 or 2 and then choose 4 2 and then choose 2 2 and then choose 1 1 or 2 and then choose 3 Outside the U.S.A. and Canada, contact your local Intermec representative. To search for your local representative, from the Intermec web site, click Contact. Who Should Read This Manual The CK32 I-Safe Handheld Computer User’s Manual is for the person who is responsible for installing, configuring, and maintaining the CK32 I-Safe. Before you work with the CK32 I-Safe, you should be familiar with your network and general networking terms, such as IP address. CK32 I-Safe Handheld Computer User’s Manual ix Before You Begin Related Documents The Intermec web site at www.intermec.com contains our documents (in PDF) that you can download for free. To order printed versions of the Intermec manuals, contact your local Intermec representative or distributor. Other Copyright Information Microsoft, Windows, and the Windows logo are registered trademarks of Microsoft Corporation in the United States and/or other countries. Bluetooth is a trademark of Bluetooth SIG, Inc., U.S.A. Wi-Fi is a registered certification mark of the Wi-Fi Alliance. This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/) This product includes cryptographic software written by Eric Young. (eay@cryptsoft.com) This product uses Regex++, Index software during its operational phases. The owner of Regex++ has granted use of the software to anyone provided such use is accompanied by the following copyright and permission notice: Regex++, Index. (Version 3.31, 16th Dec. 2001) Copyright ©1998-2001 Dr. John Maddock Permission to use, copy, modify, distribute and sell this software and its documentation for any purpose is hereby granted without fee, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. Dr. John Maddock makes no representations about the suitability of this software for any purpose. It is provided “as is” without express or implied warranty. CK32 I-Safe Handheld Computer User’s Manual Patent Information This product is covered by one or more of the following US Patents and corresponding international patents worldwide: 4894523, 4953113, 4961043, 4970379, 4988852, 5019699, 5021642, 5038024, 5081343, 5095197, 5144119, 5144121, 5182441, 5187355, 5187356, 5195183, 5216233, 5216550, 5195183, 5195183, 5218191, 5227614, 5233172, 5241488, 5243602, 5258606, 5278487, 5288985, 5308966, 5322991, 5331136, 5331580, 5342210, 5349678, 5359185, 5371858, 5373478, 5389770, 5397885, 5410141, 5414251, 5416463, 5442167, 5464972, 5468947, 5468950, 5477044, 5486689, 5488575, 5500516, 5502297, 5504367, 5508599, 5514858, 5530619, 5534684, 5536924, 5539191, 5541419, 5548108, 5550362, 5550364, 5565669, 5567925, 5568645, 5572007, 5576529, 5592512, 5594230, 5598007, 5608578, 5616909, 5619027, 5627360, 5640001, 5657317, 5659431, 5671436, 5672860, 5684290, 5719678, 5729003, 5742041, 5761219, 5764798, 5777308, 5777309, 5777310, 5786583, 5793604, 5798509, 5798513, 5804805, 5805807, 5811776, 5811777, 5818027, 5821523, 5828052, 5831819, 5834753, 5834749, 5837987, 5841121, 5842070, 5844222, 5854478, 5862267, 5869840, 5873070, 5877486, 5878395, 5883492, 5883493, 5886338, 5889386, 5892971, 5895906, 5898162, 5902987, 5902988, 5912452, 5923022, 5936224, 5949056, 5969321, 5969326, 5969328, 5979768, 5986435, 5987192, 5987499, 5992750, 6003775, 6012640, 6016960, 6018597, 6024289, 6034379, 6859190, 6064763, 6075340, 6095422, 6097839, 6102289, 6102295, 6109528, 6119941, 6128414, 6138915, 6149061, 6149063, 6152370, 6155490, 6158661, 6164542, 6164545, 6173893, 6195053, 6234393, 6234395, 6244512, 6249008, 6328214, 6330975, 6345765, 6356949, 6367699, 6375075, 6375076, 6375344, 6431451, 6435411, 6484944, 6488209, 6497368, 6532152, 6538413, 6539422, 6621942, 6641046, 6681994, 6687403, 6688523, 6732930, 6036093, 6039252, 6889903, 6967280, 7027037, 7035466, 7090137, 7121467 There may be other U.S. and foreign patents pending. CK32 I-Safe Handheld Computer User’s Manual xi xii CK32 I-Safe Handheld Computer User’s Manual 1 Using the CK32 I-Safe Handheld Computer Use this chapter to familiarize yourself with the CK32 I-Safe Handheld Computer. In this chapter you will find these sections: • Introducing the CK32 I-Safe Handheld Computer • Using the Battery • Using the Keypad • Understanding the Status Lights • Using the Touch Screen • About the Audio System • Understanding the Audio Feedback • Scanning Bar Codes CK32 I-Safe Handheld Computer User’s Manual Chapter 1 — Using the CK32 I-Safe Handheld Computer Introducing the CK32 I-Safe Handheld Computer The Intermec CK32 I-Safe is an ergonomically designed handheld computer built on the Microsoft® Windows® Mobile operating system. It is a easy-to-use, reliable computer that runs client/server and browser-based applications and is certified to be intrinsically safe. The CK32 I-Safe is designed to support world-wide intrinsic safety standards and comply with relevant European Directives. Testing and certification requires meeting the standards of Underwriters Laboratories, ATEX directives in Europe and IEC standards in the rest of the world. Scanner window Scan button Backlight Power Communications port Battery CK32 I-Safe Handheld Computer CK32 I-Safe Handheld Computers with an IEEE 802.11b/g radio installed are Wi-Fi® certified for interoperability with other 802.11b/g wireless LAN devices. CK32 I-Safe Handheld Computer User’s Manual Chapter 1 — Using the CK32 I-Safe Handheld Computer The CK32 I-Safe includes these features: • PXA270 Intel Processor • Windows Mobile 5.0 Operating System • Voice over IP support. User responsible for software integration. • Bluetooth support for scanner, RFID, Voice • 128 MB DRAM, 64 MB Flash • 512 MB embedded SD Mass Storage Card • Intrinsic safety certification for North America, Europe and countries accepting IECEx Scheme • European directive compliance These options are available for the CK32 I-Safe: • TE 2000 terminal emulation application including 3270, 5250, and VT/ANSI as well as support for third-party TE applications • Data Collection Browser (dcBrowser™) application Use this manual to understand how to use the features and options available on the CK32 I-Safe. For additional help using terminal emulation, see the TE 2000 Terminal Emulation Programmer’s Guide (P/N 977-055-xxx). For additional help using dcBrowser, see the documentation that ships with the dcBrowser gateway software or the Data Collection Browser Client User’s Guide (P/N 070-011-xxx). iBrowse is a locked-down web browser for Intermec devices that is compatible with Microsoft’s Internet Explorer but does not allow the user to exit the browser or access non-work related web sites. For additional help using iBrowse, see the iBrowse User’s Guide (P/N 961-055-xxx). For a complete list of accessories, see “Accessories” on page 122. CK32 I-Safe Handheld Computer User’s Manual Chapter 1 — Using the CK32 I-Safe Handheld Computer Using the Battery The CK32 I-Safe uses a model AB6 (P/N 318-021-xxx) lithiumion battery as its main power source. You must fully charge the main battery before you can use the CK32 I-Safe. When you change the battery, a backup battery maintains your status, memory, and real-time clock for at least 10 minutes. You must suspend your CK32 I-Safe before removing the battery, or data loss may occur.. If the battery is at a critical level, you may not be able to boot the device. You must replace the battery with a fully charged battery The lithium-ion battery pack that is used in this device may present a fire or chemical burn hazard if it is mistreated. Do not disassemble it, heat it above 100°C (212°F) or incinerate it. Li-ion Li-ion When the battery reaches the end of its useful life, the spent battery should be disposed of by a qualified recycler or hazardous materials handler. Do not mix this battery with the solid waste stream. Contact your Intermec Technologies Service Center for recycling or disposal information. Note: In the U.S.A., the EPA does not consider spent lithium-ion batteries as hazardous waste. CK32 I-Safe Handheld Computer User’s Manual Chapter 1 — Using the CK32 I-Safe Handheld Computer Charging and Installing the Battery Make sure you fully charge the AB6 battery before using your CK32 I-Safe. To charge the battery • Insert the battery into the AC11 4-slot battery charger. Charging time is approximately 7 hours. To install the battery You must suspend your CK32 I-Safe before removing the battery, or data loss may occur. • Insert the tabs on the bottom of the charged battery into the CK32 I-Safe and snap the battery into place. Beeper Speaker (internal) Battery latch AB6 battery Inserting the AB6 Battery Explosion Hazard – Use Intermec battery pack Model AB6 only. It is rated as Intrinsically Safe but it MUST NOT BE CHANGED while in a Class II or Class III environment. The battery can be changed in a Class 1 (gas) environment. CK32 I-Safe Handheld Computer User’s Manual Chapter 1 — Using the CK32 I-Safe Handheld Computer Maximizing Battery Life There are several things that you can do to extend the life of your fully charged battery. • Verify that Radio Power Management is enabled (Fast PSP). Enabling radio power management allows your radio to switch between awake and sleep modes based on network traffic. If you use the default setting of disabled (CAM), you will have the best network performance (data throughput) but it will draw the most power from your battery. • Verify that the backlight timeout is set to 15 seconds. • Verify that each setting under Power Management (Device timeout, Screen timeout) has a value of 1 minute. You can use Intermec Settings to easily make all of these configuration changes. Checking the Battery Status You can check the battery status by looking at the Battery icon on the front of the CK32 I-Safe or by checking the Power Settings. Tap the Battery icon on the Status bar or use the following procedure to check the Power Settings on your CK32 I-Safe. Either method will take you to the Settings display which indicates the percent of battery charge remaining. To check the Power Settings 1 Tap Start. The Start menu appears. 2 Tap Settings > System. 3 Tap the Power icon. The Power Settings display appears. CK32 I-Safe Handheld Computer User’s Manual Chapter 1 — Using the CK32 I-Safe Handheld Computer Understanding the Low Battery Warnings When the battery charge is getting low, you will receive an audible alert and an initial pop-up warning message with a blue border. The warning message indicates “Main Battery Low. To prevent possible data loss, replace or recharge your battery according to the owner’s manual.” A second battery icon with an ! inside also appears on the Status bar. If the first warning is not dismissed, it is followed by another audible alert and a second pop-up warning message with a red border. This message indicates “Main Battery Very Low. To prevent possible data loss, replace or recharge your battery according to the owner’s manual.” If the battery charge continues to drop, the red battery status LED blinks and the CK32 I-Safe enters Suspend mode. If the battery charge continues to drop, the battery status LED will stop blinking You can change the audible alert using the Sounds & Notifications applet. To change the audible alert • Tap Settings > Personal > Sounds & Notifications. CK32 I-Safe Handheld Computer User’s Manual Chapter 1 — Using the CK32 I-Safe Handheld Computer Using the Keypad Your CK32 I-Safe has one of the following keypad overlay options: • 42-key large numeric and function • 56-key full alphanumeric You enter all of the characters and functions printed above the keys just like you would on a standard keypad. Note: You must use the color-coded keys to access several hidden characters (such as { and }) on the CK32 I-Safe keypad. The CK32 I-Safe supports TE 2000 VT100/220/320/340 and ANSI, TE 2000 5250, and TE 2000 3270. Use the TE 2000 keypad overlays to enter the same keys that you can enter on a VT/ANSI keyboard, and IBM 5250 keyboard, or an IBM 3270 keyboard. Like the standard CK32 I-Safe overlay, the TE 2000 keypad overlays let you enter all the characters printed on or above the keys. The terminal emulation keypads also come with the same color-coded keys that are on the standard overlay. For help using TE 2000 terminal emulation, see the TE 2000 Terminal Emulation Programmer’s Guide (P/N 977-055-xxx). CK32 I-Safe Handheld Computer User’s Manual Chapter 1 — Using the CK32 I-Safe Handheld Computer Ins Page Caps Esc Shift Help NewLn Print Home Fld + Del EOF Reset Fld - PA1 Attn Hex X Roll Ctl Alt Dup FMark F11 Alpha AutLg F4 Clr F8 F7 F10 W Roll F3 Clear FldExit T F9 PA3 F6 F5 PA2 F2 F1 SysRq F12 Z Sp Sp 3270/5250 42-Key Large Numeric and Function Keypad: This keypad is designed for applications that enter mainly numeric data (0-9) and that need dedicated function keys (F1- F12). This keypad also lets you enter the entire alphabet and special characters by pressing color-coded key sequences. CK32 I-Safe Handheld Computer User’s Manual Chapter 1 — Using the CK32 I-Safe Handheld Computer Roll FldExit & PA1 F1 F6 Shift Print Sp Del F10 FldExit F11 F21 Erase F14 F19 F23 SReq F24 F22 Pg Esc F17 FMark F18 F20 Dup F9 F16 F15 ’ Hex F13 F12 F4 AutLg F8 Fld - Reset Clear Clr PA3 F3 EOF Caps Attn = # Alt Ins F7 Fld + Ctl NewLn Help PA2 F2 Home ( F5 Roll Pg Pg Pg 3270/5250 56-Key Full Alphanumeric Keypad: This keypad is designed for applications that enter mainly numeric data (0-9) and that may need to enter the entire alphabet. The keypad also provides function keys (F1-F24) and special characters, symbols, and functions by pressing color-coded key sequences. Using the Color-Coded Keys The keypad of the CK32 I-Safe provides color-coded keys to let you access additional characters, symbols, and functions printed on the keypad overlay. Once you understand how to use the color-coded keys and key sequences, you will know how to access all of the additional features printed on the keypad overlay. There are two color-coded modifier keys on the CK32 I-Safe: the orange B key and the green C key. 10 CK32 I-Safe Handheld Computer User’s Manual Chapter 1 — Using the CK32 I-Safe Handheld Computer You press and release the first key and then press and release the second key to access the color-coded character or function printed above a key. Capitalizing All Characters To type all alphabetic characters as uppercase letters, you can enable the Caps Lock feature on the CK32 I-Safe keypad. To enable Caps Lock 1 Press the orange B key. The B icon appears on the status bar. 2 To enable Caps Lock and make the Caps Lock icon ( appear on the status bar, press a second key: • On the 42-key keypad, press Shift. • On the 56-key keypad, press A. 3 Type an alphanumeric character. The letter appears as an uppercase character on the screen. To disable Caps Lock • Press the orange B key and then press either Shift or A (depending on your keypad). The Caps Lock icon disappears from the status bar. Using the Power Button When you press the Power button to turn off the CK32 I-Safe, you actually put the computer in Suspend mode. In Suspend mode, the CK32 I-Safe continues to supply power to all memory, but turns off power to most hardware. Network connectivity for 802.11 is not maintained in Suspend mode but are restored upon resume. This power-saving feature is designed to prolong battery life. When you press the Power button to turn the CK32 I-Safe back on, your computer resumes where it was when you turned it off. If you are using WPA or 802.1x security, the computer may need to reauthenticate before it starts your application. CK32 I-Safe Handheld Computer User’s Manual 11 Chapter 1 — Using the CK32 I-Safe Handheld Computer If the Battery light flashes and your CK32 I-Safe does not resume after pressing the Power button, your battery may be too low to supply power. Replace the battery. If replacing the battery does not solve the problem, see “Resetting Your Computer” on page 110. You can also use the Power button to reset the CK32 I-Safe. See “Resetting Your Computer:” on page 110 for more information. Note: Microsoft Windows Mobile supports other power saving modes including Screen Off, Unattend, and Suspend. Refer to Windows Mobile documentation for additional information. Understanding the Status Lights The status lights on the CK32 I-Safe turn on to indicate the status of the keyboard, battery, or a successful decode of a bar code. Ready to-Work indicator (blue) Good read light (green) Battery light (red) Keyboard status lights CK32 I-Safe Status Lights 12 CK32 I-Safe Handheld Computer User’s Manual Chapter 1 — Using the CK32 I-Safe Handheld Computer Understanding the CK32 I-Safe Status Lights Light Name Description Keyboard Status lights The left keyboard status light indicates the Shift Lock (orange) key is selected. The right keyboard status light indicates the Alpha Lock (green) key is selected. Battery Light Status What It Means Off Blinking Red The battery is charged. The battery blinks when the charge is low. Continued use causes the CK32 I-Safe to enter Suspend mode. You may also experience a blinking low battery light when the battery is low and you attempt to take the CK32 I-Safe out of Suspend mode. This is normal and indicates the battery needs to be charged before you use the computer. Good Read Ready-to-Work™ indicator This green light indicates when the CK32 I-Safe successfully decodes a bar code. This blue light indicates when the CK32 I-Safe is ready to use in your application, typically TE 2000. If you have problems using TE 2000, see the TE 2000 Terminal Emulation Programmer’s Guide (P/N 977-055-xxx). Light Status What It Means Off The TE 2000 application has not loaded successfully, or you are not running a Readyto-Work application. The CK32 I-Safe is not connected to the host. Blinking On A connection to the server has been established and all network connections are active. CK32 I-Safe Handheld Computer User’s Manual 13 Chapter 1 — Using the CK32 I-Safe Handheld Computer Using the Touch Screen The CK32 I-Safe has a color touch screen display. The screen is 240 x 320 pixels. The desktop is 240 x 300 pixels and the taskbar is 240 x 20 pixels. In addition, the screen supports Unicode characters, user-programmable fonts, and bitmap graphics. CK32 I-Safe Start Screen The Start screen has two distinct areas: the desktop and the taskbar. The desktop displays shortcuts to some of the applications installed on the CK32 I-Safe. The taskbar displays the Start menu icon, the time, the keyboard icon, and the desktop icon. 14 CK32 I-Safe Handheld Computer User’s Manual Chapter 1 — Using the CK32 I-Safe Handheld Computer Using the Stylus Your CK32 I-Safe has a stylus for selecting items and entering information on the touch screen. Use the stylus in place of a mouse. Using the Stylus Action Description Touch Touch the screen once with the stylus to select options, launch applications, close applications, or launch menus from the taskbar. Double-tap the screen with the stylus to launch applications. Hold the stylus on the screen and drag across the screen to select text and images. Tap and hold the stylus on an item to see a list of actions available for that item. Tap the action you want to perform. Double-tap Drag Tap and hold Aligning the Screen If the screen does not respond correctly when you tap it with the stylus, you may need to align the screen. To align the screen 1 Tap the Start icon. The Start menu appears. CK32 I-Safe Handheld Computer User’s Manual 15 Chapter 1 — Using the CK32 I-Safe Handheld Computer 2 Tap Settings > System. 3 Tap the Screen icon to open the Screen applet and then tap the Align Screen button. About the Audio System The CK32 I-Safe provides audio paths to support the following third-party applications: • Interactive VoIP • Walkie-Talkie • Digital recording • AV playback Understanding the Audio Feedback The CK32 I-Safe provide you with audio feedback when it performs some functions. For example, you may hear a beep each time you scan a valid bar code. You can change the beeper volume for your needs and environment. To enable and adjust the beeper volume 1 Tap Start > Settings > the Personal tab > the Sounds & Notifications tab > Sounds tab. 2 Tap the sounds that you want to enable, then tap ok to close the Sounds tab. 16 CK32 I-Safe Handheld Computer User’s Manual Chapter 1 — Using the CK32 I-Safe Handheld Computer 3 Tap the Volume icon at the top of the screen, tap On, and then move the slider bar to the desired volume level. To disable the beeper volume • To disable the beeper, tap the Volume icon, then drag the slider to the bottom of the scale, or tap Off. CK32 I-Safe Handheld Computer User’s Manual 17 Chapter 1 — Using the CK32 I-Safe Handheld Computer You can also change the beeper volume using the Intermec Setting application or by using the Beeper Volume command as described below. Additional Ways of Changing the Beeper Volume Method Procedure Use the Intermec Settings application. Go to Start > Settings > System > Intermec Settings > Device Settings > Beeper > Volume. Remember to press Save when using Intermec Settings. For help, see “Beeper Volume” in the Intermec Computer Command Reference Manual. Use the Beeper Volume command. Scanning Bar Codes Do not look directly into the window area or at a reflection of the beam while the CK32 I-Safe is scanning. Long-term exposure to the beam can damage your vision. Use the scanner to scan and enter bar code data. The CK32 I-Safe supports the scanning of 1D linear bar codes. When you unpack the CK32 I-Safe, these bar code symbologies are enabled: • Code 39 • Code 128 • PDF417 • UPC-A • UPC-E • EAN-8 • EAN-13 If you are using bar code labels that are encoded in a different symbology, you need to enable the symbology on the CK32 I-Safe. Use Intermec Settings to enable and disable symbologies for your scanner. 18 CK32 I-Safe Handheld Computer User’s Manual Chapter 1 — Using the CK32 I-Safe Handheld Computer Enabling or Disabling Symbologies Use the following procedure to enable or disable symbologies on your CK32 I-Safe. To enable or disable symbologies 1 Tap Start. The Start menu appears. 2 Tap Settings > System. 3 Tap the Intermec Settings icon. The Intermec Settings application appears. 4 From the Intermec Settings application, go to Data Collection > Internal Scanner > Symbologies. 5 Enable or disable any of the supported symbologies. 6 Tap File > Save Setting to save your settings. 7 Tap File > Exit to close Intermec Settings. 8 Scan bar code labels. Scanning a Bar Code Label to Verify Scanner Operation Use the following procedure to practice how to scan a bar code and to verify that your scanner is working correctly. CK32 I-Safe Handheld Computer User’s Manual 19 Chapter 1 — Using the CK32 I-Safe Handheld Computer To scan most bar code labels and verify scanner operation 1 Press the Power button to turn on the CK32 I-Safe. 2 Tap Start on the navigation bar located at the top of the screen. 3 Tap Word Mobile > New to open the Word Mobile application and a blank document. 4 Point the scanner window at the bar code label and hold the computer at a slight angle 15 to 25 cm (6 to 10 in) from the label. 5 Press the Scan button on the keypad, or pull the trigger on a handle, and direct the red beam so that it falls across all bars in the bar code label. The information you scanned appears in the Word Mobile document. *C EM RE NI Code 39 Test Bar Code *123456* *123456* When the CK32 I-Safe successfully reads a bar code label, you hear a high beep and the green Good Read light turns on briefly. 20 CK32 I-Safe Handheld Computer User’s Manual Chapter 1 — Using the CK32 I-Safe Handheld Computer 6 Release the Scan button. To scan a PDF417 or Micro PDF417 bar code and verify scanner operation 1 Press the Power button to turn on the CK32 I-Safe. 2 Point the scanner window PDF417 or Micro PDF417 bar code label and hold the computer at a slight angle 15 to 25 cm (6 to 10 in) from the label. 3 Press the Scan button on the keypad or pull the trigger on a handle, and direct the red beam so that it falls across at the top row of the bar code label. Scanning a PDF417 or Micro PDF417 Bar Code Label Use this test bar code: PDF417 Test Bar Code *123456789abcdefg* 4 Move the beam down all rows of the bar code label. The CK32 clicks as it reads each row. 5 The CK32 I-Safe emits a high beep and the green Good Read light turns on briefly when the CK32 I-Safe successfully reads the entire bar code label. CK32 I-Safe Handheld Computer User’s Manual 21 Chapter 1 — Using the CK32 I-Safe Handheld Computer You may need to continue moving the beam from the bottom of the bar code label to the top, and back to the bottom, until you hear the high beep. 6 Release the Scan button. 22 CK32 I-Safe Handheld Computer User’s Manual 2 Understanding Windows Mobile This chapter introduces Microsoft Windows Mobile 5.0 for Pocket PC. In this chapter you will find these sections: • Understanding Windows Mobile • Using Microsoft ActiveSync • Using Internet Explorer Mobile CK32 I-Safe Handheld Computer User’s Manual 23 Chapter 2 — Understanding Windows Mobile Understanding Windows Mobile This chapter introduces Microsoft Windows Mobile 5.0. While using your CK32 I-Safe, keep these key points in mind: • Tap Start on the navigation bar, located at the top of the screen, to quickly move to programs, files, and settings. Use the command bar at the bottom of the screen to perform tasks in programs. The command bar includes menus, icons, and the onscreen keyboard. • Tap and hold an item to see a pop-up menu containing a list of actions you can perform. Pop-up menus give you quick and easy access to the most common actions. Tap Start > Help, then select a topic on your CK32 I-Safe to find additional information on Windows Mobile components. Microsoft Windows Mobile contains these standard companion programs: • Word Mobile • Excel Mobile • PowerPoint Mobile Finding Information in Windows Mobile This chapter describes your CK32 I-Safe hardware, provides an overview of the programs on your CK32 I-Safe, and explains how to connect your CK32 I-Safe to a desktop, a network, or the Internet. Use the following table to understand more about the CK32 I-Safe. Finding Information in Windows Mobile For Information on: See this Source: Programs on the CK32 I-Safe. This chapter and the CK32 I-Safe Help. To view Help, tap Start > Help and then select a topic. The Windows Mobile CD. Additional programs you can install on the CK32 I-Safe. 24 CK32 I-Safe Handheld Computer User’s Manual Chapter 2 — Understanding Windows Mobile Finding Information in Windows Mobile (continued) For Information on: See this Source: Connecting to and synchronizing with a PC. Last minute updates and detailed technical information. Up-to-date information on Windows Mobile. The ActiveSync Help on your desktop. To view Help, click Help > Microsoft ActiveSync Help. The readme files located in the Microsoft ActiveSync folder on the desktop and on the Windows Mobile CD. www.microsoft.com/windowsmobile/ Windows Mobile and many of the technologies supported by the CK32 I-Safe are not from Intermec Technologies. Many of the utilities and features on a Windows Mobile device come directly from Microsoft without any modification from Intermec Technologies. There may be certain Microsoft-specific issues that Intermec Technologies would not be able to support, so contact our front-line support personnel to determine the best source of assistance. Use these URLs for additional information about Microsoft Windows Mobile (Pocket PC): • msdn.microsoft.com/support/ • support.microsoft.com/ • news.microsoft.com Learning the Basic Skills Learning to use the CK32 I-Safe is easy. This section describes the basic concepts of using and customizing your CK32 I-Safe Computer. Using the Today Screen When you turn on your CK32 I-Safe for the first time each day, you see the Today screen. You can also display it by tapping the Start icon at the top left of your display and then Today. On the Today screen, you can see important information for the day. To customize what displays on the Today screen • Tap Start > Settings > the Personal tab > Today. Status icons display information such as when the CK32 I-Safe is connected to the network or to the Internet. You can tap an icon to open the associated setting or program. CK32 I-Safe Handheld Computer User’s Manual 25 Chapter 2 — Understanding Windows Mobile Accessing Programs You can switch from one program to another by selecting it from the Start menu. To access programs • Tap Start > Programs and then the program name. The following is a partial list of programs that are on your CK32 I-Safe, in the order they appear in the Start menu. Look on the Windows Mobile CD for additional programs that you can install onto your CK32 I-Safe. • Calendar • Contacts • Internet Explorer • Messaging • Windows Media Closing an Application Tapping the OK at the upper right of the application display does not mean that the application is closed. To make sure that an application is properly closed you need to verify that the memory used by the application is released. To release memory • Tap Start > Settings > System > Memory > Running Programs. Select the application you want to close and tap Stop. Using the Navigation Bar and the Command Bar The navigation bar is located at the top of the screen. It displays the active program and current time, and allows you to switch to programs and close screens. Windows Mobile Navigation Bar The command bar is located at the bottom of the screen. Use the command bar to perform tasks in programs. The command bar includes menu names, functions, and the Input Panel icon when needed. 26 CK32 I-Safe Handheld Computer User’s Manual Chapter 2 — Understanding Windows Mobile Windows Mobile Command Bar Using Pop-Up Menus Use pop-up menus to quickly perform an action on an item. For example, you can use a pop-up menu to delete or make a copy of an item. To access a pop-up menu, tap and hold the item on which you want to perform the action. When the menu appears, tap the action you want to perform, or tap anywhere outside the menu to close the menu without performing the action. Entering Information You can enter information on your CK32 I-Safe in several ways depending on the program you are using: Understanding the Ways to Enter Information Enter Information By: Description Synchronizing Typing Writing Drawing Recording Use Microsoft ActiveSync to synchronize or copy information between your desktop PC and the CK32 I-Safe. For more information on ActiveSync, see ActiveSync Help on your desktop PC. Intermec recommends using ActiveSync version 4.1 or later with Windows Mobile devices. You can download the latest version of ActiveSync on the Microsoft web site. Enter typed text into the CK32 I-Safe by tapping keys on the onscreen keyboard or by using the handwriting recognition software. Use the stylus to write directly on the screen. Use the stylus to draw directly on the screen. Create a stand-alone recording or embed a recording into a document or note. Use the input panel to enter information in any program on your CK32 I-Safe Computer. You can either type using the onscreen keyboard or write using Block Recognizer, Letter Recognizer, or Transcriber. In either case, the characters appear as typed text on the screen. To show or hide the input panel 1 Tap the Input Panel icon. CK32 I-Safe Handheld Computer User’s Manual 27 Chapter 2 — Understanding Windows Mobile 2 Tap the arrow next to the Input Panel icon to see your choices. When you use the input panel, your CK32 I-Safe Computer anticipates the word you are typing or writing and displays it above the input panel. When you tap the displayed word, it is inserted into your text at the insertion point. The more you use the CK32 I-Safe, the more it learns to anticipate. To change word suggestion options, such as the number of words suggested at one time, tap Start > Settings > the Personal tab > Input > the Word Completion tab. Typing With the Onscreen Keyboard Tap the input panel arrow, then tap Keyboard. On the soft keyboard that is displayed, tap the keys with your stylus. • To type lowercase letters, tap the keys with the stylus. • To type a single uppercase letter or symbol, tap the Shift key. To tap multiple uppercase letters or symbols, tap the CAP key. • To convert a letter to uppercase, tap and hold the stylus on the letter and drag up. • To add a space, drag the stylus to the right across at least two keys. • To backspace one character, drag the stylus to the left across at least two keys. • To insert a carriage return, tap and hold the stylus anywhere on the keyboard and drag down. 28 CK32 I-Safe Handheld Computer User’s Manual Chapter 2 — Understanding Windows Mobile To use larger keys 1 Tap the input panel arrow. 2 Select Options. 3 Select the Large keys radio button. Using Block Recognizer Character recognition software gives you a fast and easy method for entering information in any program on the CK32 I-Safe. Letters, numbers, and punctuation you write are translated into typed text. To use Block Recognizer 1 Tap the input panel arrow and then tap Block Recognizer. 2 Write a letter in the box. It converts to typed text that appears on the screen. For help using Block Recognizer, tap the question mark next to the writing area. Using Letter Recognizer With Letter Recognizer, you can write letters using the stylus just as you would on paper. To use Letter Recognizer 1 Tap the input panel arrow and then tap Letter Recognizer. 2 Write a letter in the box. It converts to typed text that appears on the screen. For help using Letter Recognizer, tap the question mark next to the writing area. Using Transcriber With Transcriber, you can write anywhere on the screen using the stylus block just as you would on paper. Unlike Letter Recognizer and Clock Recognizer, you can write an entire sentence of information. To use Transcriber 1 Tap the input panel arrow and then tap Transcriber. 2 Tap ok. CK32 I-Safe Handheld Computer User’s Manual 29 Chapter 2 — Understanding Windows Mobile 3 Write anywhere on the screen. Pause and let Transcriber change the written characters to typed characters. For help using Transcriber, tap the question mark in the lower right-hand corner of the screen. Selecting Typed Text If you want to edit or format typed text, you must select it first. Drag the stylus across the text you want to select. You can cut, copy, and paste text by tapping and holding the selected words and then tapping an editing command on the pop-up menu or by tapping the command under Menu. Writing on the Screen In any program that accepts writing, such as the Notes program, you can use your stylus to write directly on the screen. Write the way you do on paper. You can edit and format what you have written and convert the information to text in the future. To convert the writing to text • Select Menu > Tools > Recognize. Your writing is converted to text. Finding and Organizing Information You can use File Explorer to find files on your CK32 I-Safe and organize these files into folders. To open File Explorer • Select Start > Programs > File Explorer. Customizing the CK32 I-Safe You can customize the CK32 I-Safe by adjusting settings and installing additional software. Adjusting Settings You can adjust CK32 I-Safe settings for your environment. To view the Settings options • Select Start > Settings > either the Personal tab, the System tab, or the Connections tab. 30 CK32 I-Safe Handheld Computer User’s Manual Chapter 2 — Understanding Windows Mobile Example of the Personal Tab Adjustable Settings on the CK32 I-Safe Setting Why Adjust It? Buttons To associate a program with a button or customize the way your Up/Down control repeats. To select and customize the input method you want to use (Keyboard, Block Recognizer, Letter Recognizer, or Transcriber). To limit access to the CK32 I-Safe. To customize what appears on the Start menu. Only 7 programs can appear on the Start menu. To enter your contact information. Input Lock Menus Owner Information Sounds & Notifications Today To Enable or Disable sounds for events, programs, or notifications. To select items to appear on the Today screen. You can also change the appearance of your desktop. CK32 I-Safe Handheld Computer User’s Manual 31 Chapter 2 — Understanding Windows Mobile Adding or Removing Programs Programs added to your CK32 I-Safe at the factory are stored in Read Only Memory (ROM). You cannot remove this software. All other programs and files added to the CK32 I-Safe after factory installation are stored in Random Access Memory (RAM). You can install any program created for the CK32 I-Safe, as long as the computer has enough memory available. Go to the Windows Mobile web site (www.microsoft.com/windowsmobile/ resources/communities/default.mspx) to find software. Using Microsoft ActiveSync Use Microsoft ActiveSync to synchronize the information on your desktop with the information on the CK32 I-Safe. Synchronization compares the data on the CK32 I-Safe with your PC and updates both computers with the most recent information. Note: By default, ActiveSync does not automatically synchronize all types of information. Use ActiveSync options to turn synchronization on or off for specific information types. You can also perform these functions with ActiveSync: • Copy files between the CK32 I-Safe and the desktop. • Back up and restore the CK32 I-Safe data. • Control when synchronization occurs by selecting a synchronization mode. • Select which information types are synchronized and control how much data is synchronized. Note: Intermec recommends using ActiveSync version 4.1 or later with Windows Mobile devices. You can download the latest version of ActiveSync on the Microsoft web site. To install ActiveSync 1 Connect the CK32 I-Safe to your desktop PC using the AN1 Communications Adapter (P/N 872-223-xxx). 2 Install ActiveSync on your desktop. ActiveSync is available from the Windows Mobile CD or from the Microsoft web site. ActiveSync is already installed on the CK32 I-Safe. 32 CK32 I-Safe Handheld Computer User’s Manual Chapter 2 — Understanding Windows Mobile After installation, ActiveSync automatically launches the ActiveSync Setup Wizard. 3 Follow the screens of the ActiveSync to complete the synchronization process. The wizard helps you connect to the CK32 I-Safe, set up a partnership for synchronization, and customizes synchronization settings. The synchronization process automatically begins when you finish the wizard. 4 Disconnect the CK32 I-Safe from your desktop PC. Once you have set up ActiveSync and completed the first synchronization process, you can initiate synchronization from your CK32 I-Safe. To start ActiveSync on your CK32 I-Safe • Tap Start > Programs > ActiveSync. ActiveSync opens and shows you the synchronization status. For more information about ActiveSync on the CK32 I-Safe, switch to ActiveSync, tap Start > Help, and then select a topic. CK32 I-Safe Handheld Computer User’s Manual 33 Chapter 2 — Understanding Windows Mobile Using Internet Explorer Mobile You can use Internet Explorer Mobile to run web-based applications, and view pages downloaded to the CK32 I-Safe. You can also connect to the internet through an ISP or a network connection. You can make connections using a modem, a wireless network, or Ethernet. You can use a modem connection to set up connections with an external modem. To use Internet Explorer 1 Set up a connection to your ISP or corporate network by going to Start > Settings > Connections > and tap the Connections icon. Use the Connections Help to understand the process you need to go through to set up a connection. 2 Tap Start > Internet Explorer. The default page that appears when you open Internet Explorer contains links to Intermecspecific information and to the Windows Mobile web site. Default Internet Explorer Web Page 34 CK32 I-Safe Handheld Computer User’s Manual 3 Configuring the CK32 I-Safe Use this chapter to understand how to configure the CK32 I-Safe to communicate in your network. In this chapter, you will find these sections: • Configuring the CK32 I-Safe Operating Parameters • Setting Up Ethernet Communications • Setting Up Bluetooth Communications • Setting Up 802.11 Radio Communications • Configuring Security on the CK32 I-Safe CK32 I-Safe Handheld Computer User’s Manual 35 Chapter 3 — Configuring the CK32 I-Safe Configuring the Operating Parameters You can configure many operating parameters on the CK32 I-Safe, such as the symbologies it decodes or the network settings it uses. The CK32 I-Safe provides a configuration application called Intermec Settings that allows you to set all of the operating parameters in one place. Configuring the CK32 I-Safe Using Intermec Settings Use Intermec Settings to configure the CK32 I-Safe and to view system information. Note: Using Intermec Settings, there is no way of detecting preferred networks. You access Intermec Settings from the Settings menu. To start Intermec Settings 1 Tap the Start icon to open the Start menu. 2 From the Start menu, select Settings. 3 From the Settings window, select the System tab. 4 Tap the Intermec Settings icon ( Settings application appears. 36 ). The Intermec CK32 I-Safe Handheld Computer User’s Manual Chapter 3 — Configuring the CK32 I-Safe For detailed information on the commands available in Intermec Settings, see the Intermec Computer Command Reference Manual (P/N 073529). The Intermec Computer Command Reference Manual is available from the Intermec web site. Navigating in Intermec Settings To Do This Function Do This Select or expand a command Select text in a text box Tap the command Tap in the text box and drag the stylus over the text Tap File > Save Settings or tap the disk icon. Save settings Remotely Configuring the CK32 I-Safe Using SmartSystems Foundation The SmartSystems™ server lets you manage all your SmartSystems-enabled devices at the same time from a central host PC. The CK32 I-Safe ships with the SmartSystems client, which means it is SmartSystems enabled. The SmartSystems server has a console that displays all of the CK32 I-Safes in your network. In the console, you can right-click a CK32 I-Safe and a menu appears. To configure the CK32 I-Safe, choose Intermec Settings from the menu. The SmartSystems server and console are part of SmartSystems Foundation and are available from the Intermec web site. To download SmartSystems Foundation, go to www.intermec.com/ SmartSystems. For information on how to use the SmartSystems server, see the online manual. Setting Up Ethernet Communications You can use the CK32 I-Safe directly in an Ethernet network by connecting to the network using the AN1 Communications Adapter. Note: The CK32 I-Safe supports Ethernet communication or 802.11 communications but it cannot support both at the same time. The factory default is no communications are enabled. CK32 I-Safe Handheld Computer User’s Manual 37 Chapter 3 — Configuring the CK32 I-Safe Intrinsically Safe rules prohibit direct connection to the CK32 I-Safe. To use the CK32 I-Safe in an Ethernet network 1 Tap the iConnect icon ( ) in the lower right corner of the Today screen.From the menu, select Enable > Ethernet. This change disables 802.11 networking on the CK32 I-Safe. 2 You will be prompted to reboot the device for changes to take affect. Press and hold the Power button for 10 seconds to initiate the reboot. Do not use the Reset button . See “Preferred Reset Method” on page 110 for more information. 3 Go to Start > Settings > the System tab > Intermec Settings > Communications > Ethernet Adapter > IP Settings. 4 If you have a DHCP server, enable DHCP. or If you do not have a DHCP server, set these parameters: • IP address • Subnet mask • Default router 38 CK32 I-Safe Handheld Computer User’s Manual Chapter 3 — Configuring the CK32 I-Safe 5 If required for your network, you may also need to set these parameters on each CK32 I-Safe: • Primary and secondary DNS servers • Primary and secondary WINS servers 6 Make sure your CK32 I-Safe is talking to the network and that the network can see your CK32 I-Safe. To check the status of your Ethernet connection 1 Tap the iConnect icon ( Today screen. ) in the lower right corner of the 2 From the menu, select Status > Ethernet. The Ethernet Status screen appears and checks the connection. You can also use iConnect to configure the network settings if you need to change any setting. Tap Tools > Ethernet IP Settings from the iConnect menu. Setting Up Bluetooth Communications You can send information to a Bluetooth device wirelessly using the standard Bluetooth radio in the CK32 I-Safe. The Bluetooth technology uses short-range radio links and allows for communications over a 10-meter (32.8 foot) range. You can use the Bluetooth radio to connect to wireless devices including: • Scanners • Printers • Headsets CK32 I-Safe Handheld Computer User’s Manual 39 Chapter 3 — Configuring the CK32 I-Safe To turn the Bluetooth radio on 1 Select Start > Settings > System > Intermec Settings > Bluetooth. 2 Tap the Power On radio button and tap File > Save Settings. Once Bluetooth is enabled, it stays enabled through a warm or cold boot and maintains virtual COM ports (such as printing) registration. For more information on Bluetooth software, see the Bluetooth Resource Kit and the Wireless Printing Development Guide in the Intermec Developer Library (IDL). You can download this Resource Kit from the Intermec Developer Library web site at www.intermec.com/idl. 40 CK32 I-Safe Handheld Computer User’s Manual Chapter 3 — Configuring the CK32 I-Safe Use this table to understand the settings you see in the Bluetooth menu in Intermec Settings. Bluetooth Settings Setting Description Power Set and view whether the Bluetooth radio is on or off. Determines how the device appears to other devices during discovery. Makes the CK32 I-Safe discoverable. Makes the CK32 I-Safe connectable. Displays the version of the Intermec Bluetooth Library. Displays the version of the Bluetooth Radio Hardware. Displays the Bluetooth address of your CK32 ISafe. Class of Device Discoverable Connectable IBT Radio Device Address Configuring Bluetooth Communications for Wireless Printing This section explains how to configure the CK32 I-Safe for Bluetooth wireless printing. You need to: • make sure Bluetooth power is on. For help, see the procedure in “Setting Up Bluetooth Communications” on page 39. • create an application that lets you print. For help, see the next section. • select the current wireless printer on the CK32 I-Safe. For help, see “Selecting the Current Wireless Printer on the CK32 I-Safe” on page 42. Creating an Application That Lets You Print Wirelessly The CK32 I-Safe does not ship with an application that lets you print wirelessly. You must create an application that opens the wireless printing COM port on the CK32 I-Safe. For help, see the Bluetooth Resource Kit section of the IDL Resource Kit Developer’s Guide, P/N 934-006-xxx. The Wireless Printing applet is available from Start > Settings > System. The applet separates the task of wireless printing setup from other Bluetooth management tasks. CK32 I-Safe Handheld Computer User’s Manual 41 Chapter 3 — Configuring the CK32 I-Safe The Wireless Printing applet uses the concept of a “current wireless printer.” The CK32 I-Safe connects to the current wireless printer when your application opens the wireless printing COM port on the CK32 I-Safe. If there is no current wireless printer selected on your CK32 I-Safe, there is no wireless printing COM port registered on your CK32 I-Safe. You must select a current wireless printer on your CK32 I-Safe, as described in the next section. The Wireless Printing applet performs these tasks on the CK32 ISafe: • Helps you select the current wireless printer • Stores the current wireless printer in the registry • Registers/deregisters the wireless printing COM port • Stores the wireless printing COM port in the registry as the WPort Specifically, the current wireless printer is registered and deregistered on Bluetooth stack load/unload. If you select a different current wireless printer, the existing wireless printing COM port is deregistered and the new one is registered instead. The Wireless Printing applet uses the Bluetooth COM Port Control to handle COM port registration/deregistration. Selecting the Current Wireless Printer on the CK32 I-Safe By default, there is no current wireless printer selected on the CK32 I-Safe. There are three ways to select the current wireless printer: • Discovering the printer using Bluetooth device discovery • Manually entering the printer’s Bluetooth device address • Choosing the printer from a list of previously discovered printers 42 CK32 I-Safe Handheld Computer User’s Manual Chapter 3 — Configuring the CK32 I-Safe To discover the printer with Bluetooth device discovery 1 Select Start > Settings > the Systems tab > Wireless Printing. The Wireless Printing wizard appears. 2 Tap Acquire Printer to initiate printer discovery. All Bluetooth printers discovered within range appear in the devices list. 3 Select the printer you want to connect to and then tap OK. If your preferred printer does not appear, make sure the printer is turned on and discovery is enabled, and then repeat Steps 1 through 3. 4 Tap Test Print. The printer prints out the test page. CK32 I-Safe Handheld Computer User’s Manual 43 Chapter 3 — Configuring the CK32 I-Safe To manually enter the device address of the printer 1 Select Start > Settings > the System tab > Wireless Printing. The Wireless Printing wizard appears. 2 Tap Manual > Acquire Printer. The wizard advances to the next screen where you enter the device address. 3 Type the address of the printer in the Enter Device Address text box and then tap OK. The keyword -unknown- appears in the Device Name field in the Current Wireless Printer box. The name of the printer is not sent to the CK32 I-Safe when you manually enter the printer address. 4 Tap Test Print. The printer prints out the test page. To choose the printer from a list of previously discovered printers 1 Make sure you have already performed a Bluetooth device discovery. 2 Select Start > Settings > the System tab > Wireless Printing. The Wireless Printing wizard appears. 3 Tap Set Different Printer. The Devices list appears with the list of previously discovered printers. 4 Select the printer you want and tap OK. 5 Tap Test Print. The printer prints out the test page. 44 CK32 I-Safe Handheld Computer User’s Manual Chapter 3 — Configuring the CK32 I-Safe Connecting to a Bluetooth Audio Device Use the Bluetooth Audio applet to discover, activate, and connect to Bluetooth audio devices such as a Bluetooth headset. You can control the audio volume and microphone gain for the connected Bluetooth audio device. To connect to a Bluetooth headset 1 Select Start > Settings > the System tab > Bluetooth Audio. 2 Tap Search for devices. Discovered audio devices are added to the list with an icon to identify them. 3 Double-tap a Bluetooth audio device from the list of Connect headsets / hands-free devices. 4 When a pop-up menu appears and then select Activate. The device icon changes to include a check mark. 5 Double-tap the device name and then select Connect. When a connection is established, the statues changes to connected. 6 Tap the Volume slider bar or Microphone slider bar to adjust the setting. Setting Up 802.11 Radio Communications The CK32 I-Safe has an internal 802.11 b/g radio to transfer data using wireless communications. This section of the manual assumes that you have already set up your wireless communications network including your access points. If you are using a UDP Plus network, you also need to have your Intermec Application Server communicating with a host computer. Note: The CK32 I-Safe supports Ethernet communication or 802.11 communications but it cannot support both at the same time. The factory default is no communications are enabled. The CK32 I-Safe supports these network protocols: • TCP/IP • UDP Plus The next sections explain the parameters you need to configure for the CK32 I-Safe to work in your wireless network. CK32 I-Safe Handheld Computer User’s Manual 45 Chapter 3 — Configuring the CK32 I-Safe Configuring the Network Parameters for a TCP/IP Network In a TCP/IP network, the CK32 I-Safe communicates with a host computer directly using TCP/IP. The access point acts as a bridge to allow communications between the wired network and the wireless network. To use wireless communications in a TCP/IP network 1 Tap the iConnect icon ( ) in the lower right corner of the Today screen.From the menu, select Enable > Wireless. This disables the Ethernet connection. 2 You will be prompted to reboot the device for changes to take affect. Press and hold the Power button for 10 seconds to initiate the reboot. Do not use the Reset button. See “Preferred Reset method” on page 110 for more information. 3 Go to Start > Settings > the System tab > Intermec Settings > Communications > 802.11 Radio. 4 Configure these network parameters on each CK32 I-Safe in the network: • Network name (SSID) • IP settings (if not using DHCP) 5 Make sure that the CK32 I-Safe is talking to the network and that the network can see the CK32 I-Safe. 46 CK32 I-Safe Handheld Computer User’s Manual Chapter 3 — Configuring the CK32 I-Safe 6 Configure security. For help, see See “Using ISpyWiFi” on page 48. You can configure the network parameters on the CK32 I-Safe to using Intermec Settings or ISpyWiFi. For information on Intermec Settings, see “Configuring the CK32 I-Safe Using Intermec Settings” on page 36. Configuring the Network Parameters for a UDP Plus Network In a UDP Plus network, the CK32 I-Safe communicates with a host computer through the Intermec Application Server. The Intermec Application Server translates UDP Plus packets on the wireless network into TCP/IP packets on the wired network and vice versa. The access point acts as a bridge to allow communications between the wired network and the wireless network. To use wireless communications in a UDP Plus network 1 Go to Start > Settings > the System tab > Intermec Settings > Communications >UDP Plus. 2 Configure these network parameters on the CK32 I-Safe: • UDP Plus Activate • Controller IP address • Controller Port 3 Make sure the CK32 I-Safe is talking to the network and that the network can see the CK32 I-Safe. 4 Configure security. For help, see “Configuring Security on the CK32 I-Safe” in the next section. Checking the Status of Your Wireless Connection After you configure your wireless settings, you can use iConnect to check the status of your connection. To check the status of your wireless connection 1 Tap the iConnect icon ( Today screen. ) in the lower right corner of the 2 From the menu, select Status > Wireless. The Wireless Status screen appears and checks the connection. CK32 I-Safe Handheld Computer User’s Manual 47 Chapter 3 — Configuring the CK32 I-Safe You can also use iConnect to configure the network settings if you need to change anything by tapping Tools > Wireless Settings from the iConnect menu. Using ISpyWiFi The ISpyWiFi utility provides more detailed information for the 802.11 radio connection in your CK32 I-Safe, such as MAC address, access point information, association, encryption, power management, antenna status, RSSI, data link rates, and supplicant status. Starting the Utility The ISpyWiFi utility is installed in your CK32 I-Safe as an executable. You can either start the utility using File Explorer, or creating a shortcut to start the utility from the CK32 I-Safe desktop, or from iConnect. To start the ISpy WiFi utility via File Explorer • Tap Start > Programs > the File Explorer icon, then tap the “\Windows” folder from the root. Scroll down for, then double-click the ISpyWifi executable. To place the ISpyWiFi utility in the Programs group 1 Press and hold your stylus on the ISpyWifi executable for its pop-up menu, then select Copy. 48 CK32 I-Safe Handheld Computer User’s Manual Chapter 3 — Configuring the CK32 I-Safe 2 Scroll up to the “\Start Menu\Programs” folder, then tap it to open. 3 Press and hold your stylus in an empty (white) area in the folder, for its pop-up menu, then select Paste Shortcut. Close the File Explorer, select Start > Programs to locate the Shortcut to ISpyWifi icon, like the following. Tap this icon to access the ISpyWifi application. To start iSpyWiFi from iConnect 1 Tap the iConnect icon ( Today screen. ) in the lower right corner of the 2 From the menu, select Status > Wireless > Advanced. The iSpyWiFi screen appears. ISpyWiFi The ISpyWiFi tab contains network interface, configuration, access point, and radio frequency information: CK32 I-Safe Handheld Computer User’s Manual 49 Chapter 3 — Configuring the CK32 I-Safe ISpyWiFi Tab Contents WiFi NIC (Network Interface Card) BCMCF1 A WLAN adapter and its associated driver version MAC The client radio MAC address IP(DHCP) The IP address of the client radio, if using DHCP IP (Static) The IP address of the client radio, if using a static IP address AP Status Shows whether the radio is associated with the access point Channel The channel on which the radio is communicating with the access point ESSID The text SSID (Network Name) for your network BSSID MAC address of radio AP with which the client radio is communicating Config Association Shows one of the following types: Open, WPA, WPA-PSK, WPA2, Network EAP Encrypt Shows potential encryptions for the association shown: Key Absent/WEP, TKIP, Key Absent, TKIP/AES, WEP Power CAM (Constantly Awake Mode) or FAST PSP (Power Save Poll) Antenna Diversity (multiple antennas), Primary (one antenna) RF TX Power Transmit power level in milliwatts (mW). RSSI The Received Signal Strength Indicator. The closer to zero, the better. For example: -40dBm is excellent, while -60dBm is good. Link The data rate at which the radios are communicating 50 CK32 I-Safe Handheld Computer User’s Manual Chapter 3 — Configuring the CK32 I-Safe WiFi Scan Use the WiFi Scan tab to scan your network and bring back information about any access points with which you can communicate. Tap Scan, then wait for the table to fill with information. Tap any of the columns to sort by ascending or descending order. Tap the slider bar on the bottom to scroll left and right to view all of the information. WiFi Scan Tab Contents Scan SSID The SSID broadcast from the access point Signal The RSSI seen from the access point Channel Channel on which client radio is communicating with access point BSSID The MAC address for the access point radio Privacy “Y” - WEP, TKIP, or AES encryption is being used; “N” - no encryption is being used CK32 I-Safe Handheld Computer User’s Manual 51 Chapter 3 — Configuring the CK32 I-Safe Supplicant The Supplicant tab provides you with security and authentication information configured elsewhere in the CK32 I-Safe. SuppSupplicant Tab Contents Supplicant Tab Contents Supplicant Service Status ON: Intermec Funk Security is enabled OFF: Microsoft Security is enabled Starting Up: Shutting Down: Unknown/Undefined: Authentication State: authenticated: Authentication Server successful authentication failed: Previous authentication attempt failed disconnected: No authentication used, Open or Static WEP connection used acquired: Access point located, authentication process not initiated authenticating: Attempting authentication with Authentication Server logoff: Current session terminated by supplicant unknown: Error occurred, but not defined 52 CK32 I-Safe Handheld Computer User’s Manual Chapter 3 — Configuring the CK32 I-Safe Supplicant Tab Contents (continued) Authentication Result success: Authentication successful time-out: Authentication Server not responding to requests, you may be out of range no credentials: Proper credentials not configured in device client reject: Unable to validate access point certificate server reject: Authentication Server rejects submitted credentials unknown: No authentication used or in the process of authentication Supplicant Events Displays output from the supplicant detailing its status. Intermec Supplicant Version Version of Intermec Funk Security in the CK32 I-Safe • Click Configure Profile to launch the Profile Wizard and configure 802.11 options. • Click Reconnect to disassociate the radio, momentarily dropping its connection. The radio then reassociates and reauthenticates, but does not do anything with the radio driver. • Click Clear Events to remove the information shown in the Supplicant Event box. CK32 I-Safe Handheld Computer User’s Manual 53 Chapter 3 — Configuring the CK32 I-Safe Ping Use the Ping tab to contact with any host in your network for information. Ping Tab Contents Ping Timing Statistics Min: The shortest ping reply in milliseconds (ms) Max: The maximum ping reply in milliseconds Avg: The average ping reply time Count: The number of pings already completed Timeouts: The number of pings that did not receive a response BSSID The MAC address for the access point radio Channel: The channel on which the access point is communicating RSSI The RSSI seen on the access point Link The speed at which the last ping occurred. 1 From the Host drop-down list, select an IP address for the host you want to ping. Enter a new IP address using the input panel or the keypad. Select Clear List to remove all the IP addresses from the drop-down list. 2 From the Repetitions drop-down list, select the number of times to ping the selected host. These repetitions are done once per second. 54 CK32 I-Safe Handheld Computer User’s Manual Chapter 3 — Configuring the CK32 I-Safe 3 Tap Ping to initiate contact with the selected host 4 Depending on how the screen is set up, you can toggle between a graph and a list of ping results: • Tap Graph to toggle to the graphical view of 25 of the most recent pings and their response results, like in the following sample graph: Note the size of the gray area represents the standard deviation from the mean. • Tap List to toggle to detailed information showing what ping touched what host and its RTT (Round Trip Time). Supplicant Logging If you reach a situation where you need to send in debug information to Intermec Product Support or Intermec Engineering, you can use the Intermec Funk Security logging feature. 1 Tap the Supplicant tab, then tap Configure Profile to access the Profile Wizard. 2 Tap Edit Selected Profile, then tap the Advanced tab.Check Enable Logging, tap ok to close the profile settings, then tap ok to close the Profile Wizard. CK32 I-Safe Handheld Computer User’s Manual 55 Chapter 3 — Configuring the CK32 I-Safe The debug output file is then stored in the “\My Device” root folder as a text file called “uroddsvc.” Using File Explorer, press and hold your stylus on this file for its pop-up menu, then select any of its options to copy, beam, send, or delete this file. Configuring Security on the CK32 I-Safe The CK32 I-Safe provides three types of security for your wireless network: • Wi-Fi Protected Access (WPA) • 802.1x • WEP This section explains how to configure security on your wireless CK32 I-Safe. If you choose not to use security, see “Disabling Security” on page 79. Intermec always recommends that you implement security. You must use either Funk or Microsoft security to implement your security solution. For details, see “Choosing Between Funk and Microsoft Security” on page 60. 56 CK32 I-Safe Handheld Computer User’s Manual Chapter 3 — Configuring the CK32 I-Safe If you are using WPA-802.1x, WPA2-802.1x, or 802.1x security, this section assumes that your authentication server and authenticators are properly configured. Note: Your security choice does not depend on your authentication server. For example, you can choose Funk security if you use Microsoft’s Internet Authentication Service. Understanding the Wireless Network Your wireless radio adapter (network interface card) connects to wireless networks of two types: infrastructure and ad-hoc networks. • Infrastructure networks get you onto your corporate network and the internet. The CK32 I-Safe establishes a wireless connection to an access point, which links you to the rest of the network. When you connect to a network using an access point, you are using the 802.11 b/g infrastructure mode. • Ad-hoc networks are private networks shared between two or more clients. Each wireless network is assigned a name or SSID (Service Set Identifier) to allow multiple networks to exist in the same area without infringing on each other. Intermec recommends using security with wireless networks to prevent unauthorized access to your network and to ensure the privacy of transmitted data. Authentication by both the network and the user are required elements for secure networks. Use the following table to understand some of the wireless network terminology. Using WPA Security Wi-Fi Protected Access (WPA) is a strongly enhanced, interoperable Wi-Fi security that addresses many of the vulnerabilities of Wired Equivalent Privacy (WEP). Instead of WEP, WPA uses Temporal Key Integrity Protocol (TKIP) for its data encryption method. Currently, WPA satisfies some of the requirements in the IEEE 802.11i draft standard. When the standard is finalized, WPA will maintain forward compatibility. CK32 I-Safe Handheld Computer User’s Manual 57 Chapter 3 — Configuring the CK32 I-Safe WPA runs in 802.1x (Enterprise) mode or PSK (Pre-Shared Key) mode: • In Enterprise mode, WPA provides user authentication using 802.1x and an Extensible Authentication Protocol (EAP). That is, an authentication server (such as a RADIUS server) must authenticate each device before the device can communicate with the wireless network. • In PSK mode, WPA provides user authentication using a shared key between the authenticator and the CV30. WPAPSK is a good solution for small offices or home offices that do not want to use an authentication server. To use WPA security, you need: • an authentication server (Enterprise mode only). • an access point with an 802.11 b/g radio that supports WPA. • a CK32 I-Safe with the 802.11b/g radio and the 802.1x/WPA security option. The CK32 I-Safe also supports Wi-Fi Protected Access 2 (WPA2) if you are using Funk security. WPA2 uses an Advanced Encryption Standard (AES) for data encryption. WPA2 runs in 802.1x (Enterprise) mode or PSK (Pre-Shared Key) mode: • For WPA2-802.1x mode, WPA2 requires authentication in two phases; the first is an open system authentication and the second uses 802.1x and an Extensible Authentication Protocol (EAP) authentication method. • In PSK mode, WPA2 provides user authentication using a shared key between the authenticator and the CK32 I-Safe. WPA2-PSK is a good solution for small offices or home offices that do not want to use an authentication server. Using Static WEP Security The CK32 I-Safe uses the Wired Equivalent Privacy (WEP) protocol to add security to your wireless network based on the 802.11 standard. 58 CK32 I-Safe Handheld Computer User’s Manual Chapter 3 — Configuring the CK32 I-Safe To use WEP security, you need: • a CV30 with an 802.11b/g radio. • an access point with an 802.11b/g radio. Using 802.1x Security 802.1x security provides centralized user authentication using an authentication server, authenticators (access points), and supplicants. These components communicate using an EAP authentication type, such as TLS (Transport Layer Security) or PEAP (Protected Extensible Authentication Protocol). 802.1x security provides data encryption using dynamic WEP key management. To use 802.1x security, you need: • an access point with an 802.11b/g radio. • a CK32 I-Safe with an 802.11b/g radio and the 802.1x/WPA security option. • an authentication server. Using LEAP Security Lightweight Extensible Authentication Protocol (LEAP), also known as Cisco-Wireless EAP, provides username/passwordbased authentication between a wireless client and a RADIUS server. In the 802.1x framework, traffic cannot pass through an Ethernet hub or wireless network access point until it successfully authenticates itself. The station must identify itself and prove that it is an authorized user before it is actually allowed to use the LAN. LEAP also delivers a session key to the authenticated station, so that future frames can be encrypted with a key that is different than keys used by other sessions. To use LEAP security, you need: • a RADIUS server. • Cisco access points. LEAP security is not supported with Microsoft security. CK32 I-Safe Handheld Computer User’s Manual 59 Chapter 3 — Configuring the CK32 I-Safe Choosing Between Funk and Microsoft Security The CK32 I-Safe provides both Funk and Microsoft security choices. Funk security is the default setting. Use the following sections to set security using either Funk or Microsoft as your security choice. Both security choices offer similar features, but Funk security also offers these features: • CCX v2.0 compliance • Support for LEAP, TTLS, and FAST • Configuration of up to four profiles If you want to use the default Funk security, you need to select a profile. For help, see one of the following sections, “Configuring Funk Security Using Intermec Settings.” or “Configuring Funk Security Using the Profile Wizard.” If you want to use Microsoft security, you need to select it as your security choice. For help, see “Configuring Microsoft Security” on page 73. Configuring Funk Security Using Intermec Settings You can define up to four profiles for Funk security. Different profiles let your CK32 I-Safe communicate in different networks without having to change all of your security settings. For example, you may want to set up one profile for the manufacturing floor and one for the warehouse. By default, the active profile is Profile_1. To select a profile for Funk security 1 Select Start > Settings > the System tab > Intermec Settings. 2 Select Communications > 802.11 Radio > Funk Security. 3 Select Active Profile, choose a profile from the list, and save your settings. 4 Tap the active profile to expand it. 5 (Optional) Give your profile a meaningful name: a Select Profile Label and a text box appears. b Select the text in the box, type a meaningful name, and save your settings. 60 CK32 I-Safe Handheld Computer User’s Manual Chapter 3 — Configuring the CK32 I-Safe 6 Select one profile as the active profile by tapping Active Profile and choosing a profile fro the drop-down list. 7 Save your settings. Configuring WPA Security With Funk Security Use these procedures to set WPA-802.1x, WPA2-802.1x, WPAPSK, or WPA2-PSK security on your CK32 I-Safe with Funk security. To configure WPA-802.1x with Funk security 1 Open Intermec Settings. 2 Make sure you have configured the communications and radio parameters on your CK32 I-Safe. 3 Make sure you have selected Funk as your security choice. 4 Open Intermec Settings. 5 Choose Communications > 802.11 Radio > Funk Security > Profile. 6 For Association, choose WPA or WPA2 and press Enter. Encryption automatically defaults to TKIP if you are using WPA. Encryption automatically defaults to WEP if you are using Shared. 7 For 8021x, choose TTLS, PEAP, EAP-FAST, or TLS and press Enter. If you choose TTLS or PEAP: a For Prompt for Credentials, choose Enter credentials now. Note: You can use Prompt for credentials to troubleshoot your connection to the network if you have problems. By choosing Enter credentials now, you are storing the user name and password on the device so that you will not need to enter it every time. b Select User name and type your user name. c Select User Password and type a user password. d For Validate Server Certificate, choose Yes. CK32 I-Safe Handheld Computer User’s Manual 61 Chapter 3 — Configuring the CK32 I-Safe Note: You must have the date on the CK32 I-Safe set correctly when you enable Validate Server Certificate. If you choose TLS: a Load a user and root certificate on your CK32 I-Safe. For help, see “Loading a Certificate” on page 76. b For Validate Server Certificate, choose Yes. c You must enter a User Name and Subject Name. You can also enter a Server Common Name if you want to increase your level of security. 8 Save your settings. To enable WPA-PSK or WPA2-PSK with Funk security 1 Open Intermec Settings. 2 Make sure you have configured the communications parameters and selected Funk as your security choice. 3 Make sure you have selected Funk as your security choice. 4 Open Intermec Settings. 5 Choose Communications > 802.11 Radio > Funk Security > Profile. 6 For Association, choose WPA or WPA2. 7 For 8021x, choose None. 8 For Pre-Shared Key, enter the pre-shared key or the passphrase. The pre-shared key may be given in hexadecimal by prefixing a string of 64 hex digits with 0x for a total of 66 characters, or by entering a passphrase of 8 to 63 characters. The pre-shared key value must exactly match the key on the authenticator. 9 Save your settings. Configuring 802.1x Security With Funk Security 1 Open Intermec Settings. 62 CK32 I-Safe Handheld Computer User’s Manual Chapter 3 — Configuring the CK32 I-Safe 2 Make sure you have configured the communications and radio parameters on your CK32 I-Safe. 3 Make sure you have selected Funk as your security choice. 4 Choose Communications > 802.11 Radio > Funk Security > Profile. 5 For Association, choose Open. 6 For Encryption, choose WEP. 7 For Inner Authentication, choose TTLS, PEAP or TLS. If you choose TTLS or PEAP: a Select User name and type your user name. b Select Password prompt, and choose Enter password now. Note: You can use Prompt for password to troubleshoot your connection to the network if you have problems. c Select User Password and type a user password. d For Validate Server Certificate, choose Enabled. If you choose TLS: a Load a user and root certificate on your CK32 I-Safe. For help, see “Loading a Certificate” on page 76. b For Validate Server Certificate, choose Yes. c You must enter a User Name and Subject Name. You can also enter a Server Common Name if you want to increase your level of security. 8 Save your settings. Configuring LEAP Security on the CK32 I-Safe 1 Open Intermec Settings. 1 Make sure you have selected Funk as your security choice. 2 Make sure you have configured the communications parameters and selected Funk as your security choice. CK32 I-Safe Handheld Computer User’s Manual 63 Chapter 3 — Configuring the CK32 I-Safe 3 From Intermec Settings, choose Communications > 802.11 Radio > Funk Security > Profile. 4 For 8021x, choose LEAP. 5 For Association, choose Open, WPA, WPA2, or Network EAP. Encryption automatically defaults to TKIP if you choose WPA, to AES if you choose WPA2, and to WEP if you choose Open or Network EAP. 6 For Prompt for Credentials, select Enter credentials now. 7 Select User name and type your user name. 8 Select User Password and type your user password. 9 Save your settings. Configuring Static WEP Security With Funk Security 1 Open Intermec Settings. 2 Make sure you have configured the communications parameters and selected Funk as your security choice. 3 Choose Communications > 802.11 Radio > Funk Security > Profile. 4 For Association, choose Open. 5 For Encryption, choose WEP. 6 For 8021x, choose None. 7 Define a value for the keys you want to use. You can define up to four keys (Key 1 through Key 4). Enter an ASCII key or a hex key that is either 5 bytes or 13 bytes long depending on the capability of the radio. Set a 5byte value for 64-bit WEP or a 13-byte value for 128-bit WEP. Hex keys must be preceded by 0x and contain 5 or 13 hex pairs. 8 For Transmit key, choose the key you want to use for transmitting data. 9 Save your settings. 64 CK32 I-Safe Handheld Computer User’s Manual Chapter 3 — Configuring the CK32 I-Safe Configuring Funk Security Using the Profile Wizard You can start 802.11 b/g communications on the CK32 I-Safe using the Profile Wizard. A profile contains all the information necessary to authenticate you to the network, such as login name, password or certificate, and protocols by which the CK32 I-Safe is authenticated. You can have up to four profiles for different networks. For example, you may have different login names or passwords on different networks. To select a profile for Funk security 1 Open Intermec Settings. 2 Select Start > Settings > the Systems tab > Wireless Network. or Tap the iConnect icon ( ) icon in the lower right corner of the screen and select Tools > Wireless Settings. The Profile Wizard appears on the screen. 3 From the Profile list, select the profile you want to configure 4 Tap Edit Selected Profile. 5 (Optional) Give your profile a meaningful name by selecting the text in the Profile Label text box and typing a meaningful name. CK32 I-Safe Handheld Computer User’s Manual 65 Chapter 3 — Configuring the CK32 I-Safe 6 From the Network type list, select either Infrastructure or Ad-Hoc. Select Infrastructure if the network uses access points to connect to the corporate network or internet. Select Ad-Hoc to set up a private network with one or more participants. 7 Enter the SSID (Network Name) if different than the profile name. 8 Tap OK. Configuring WEP Security With Profile Wizard 1 In the Profile Wizard, select the Security page. 2 For 8021x Security, choose None. 3 For Association, choose Open or Shared to match the settings on your access point. 4 For Encryption, choose WEP. 5 From the Data TX Key list, select the key you want to use for transmitting data. 6 Define a value for the keys you want to use. You can define up to four keys (Key 1 through Key 4). Enter an ASCII key or a hex key that is either 5 bytes or 13 bytes long depending on the capability of the radio. Set a 5- 66 CK32 I-Safe Handheld Computer User’s Manual Chapter 3 — Configuring the CK32 I-Safe byte value for 64-bit WEP or a 13-byte value for 128-bit WEP. Hex keys must be preceded by 0x and contain 5 or 13 hex pairs. 7 Tap OK. Configuring WPA-PSK Security With Profile Wizard 1 In the Profile Wizard, select the Security page. 2 For 8021x Security, choose None. 3 For Association, choose WPA. 4 For Pre-Shared Key field, enter the passphrase as ASCII. The passphrase must be 8 to 63 characters and match the passphrase on the access point. 5 Tap OK. Configuring WPA2-PSK Security With Profile Wizard 1 In the Profile Wizard, select the Security page. 2 For 8021x Security, choose None. 3 For Association, choose WPA2. 4 For Pre-Shared Key field, enter the passphrase as ASCII. The passphrase must be 8 to 63 characters and match the passphrase on the access point. 5 Tap OK. CK32 I-Safe Handheld Computer User’s Manual 67 Chapter 3 — Configuring the CK32 I-Safe Configuring PEAP Security With Profile Wizard Protected EAP (PEAP) performs secure authentication against Windows domains and directory services. It is comparable to EAP-TTLS, though not as flexible. To configure PEAP security 1 In the Profile Wizard, select the Security page. 2 For 8021x Security, choose PEAP. 3 For Association, choose Open, WPA, or Network EAP. 4 For Encryption, choose TKIP if you selected WPA for association, or WEP if you selected Network EAP for association. 5 For Username, type a unique username for this protocol. 6 Select Prompt for password to have the user enter this password each time to access the protocol, or select Use following password to use the protocol without entering a password each time you use the CK21 I-Safe. 7 In the Password field, type a unique password for this protocol. 8 Tap Get Certificates to obtain or import server certificates. For help with certificates, see “Loading a Certificate” on page 76. 68 CK32 I-Safe Handheld Computer User’s Manual Chapter 3 — Configuring the CK32 I-Safe 9 Tap Additional Settings to assign an inner PEAP authentication and set options for server certificate validation and trust. 10 From the Inner PEAP Authentication list, choose EAP/MSCHAP-V2, EAT/Token Card, or EAP/MD5-Challenge. 11 Check Validate Server Certificate to verify the identity of the authentication server based on its certificate when using PEAP. 12 Tap Root CA, select a root certificate, and then tap OK. 13 Enter the Common Names of trusted servers. 14 Tap OK. Configuring TLS Security With Profile Wizard EAP-TLS is a protocol based on the Transport Layer Security (TLS) protocol widely used to secure web sites. This protocol requires both the user and authentication server to have certificates for mutual authentication. To configure TLS security 1 In the Profile Wizard, select the Security page. 2 For 8021x Security, choose TLS. 3 For Association, choose Open, WPA, WPA2, or Network EAP. 4 For Encryption, choose TKIP or AES if you selected WPA2 for association, or WEP or CKIP if you selected Network EAP for association. 5 For Username, type a unique username for this protocol. 6 Select Prompt for password to have the user enter this password each time to access the protocol, or select Use following password to use the protocol without entering a password each time you use the CK32 I-Safe. 7 In the Password field, type a unique password for this protocol. 8 Tap Get Certificates to obtain or import server certificates. For help with certificates, see “Loading a Certificate” on page 76. CK32 I-Safe Handheld Computer User’s Manual 69 Chapter 3 — Configuring the CK32 I-Safe 9 Tap Additional Settings to Certificate Settings. 10 Check Validate Server Certificate to verify the identity of the authentication server based on its certificate when using TLS. 11 Tap Root CA, select a root certificate, and then tap OK. 12 Enter the Common Names of trusted servers. 13 Tap OK. Configuring TTLS Security With Profile Wizard TTLS protocol provides authentication like EAP-TLS but does not require user certificates. User authentication is done using a password or other credentials that are transported in a securely encrypted “tunnel” established using server certificates. To configure TTLS security 1 In the Profile Wizard, select the Security page. 2 For 8021x Security, choose TTLS. 3 For Association, choose Open, WPA, WPA2, or Network EAP. 4 For Encryption, choose TKIP or AES if you selected WPA2 for association, or WEP or CKIP if you selected Network EAP for association. 5 For Username, type a unique username for this protocol. 6 In the Password field, type a unique password for this protocol. 7 Select Prompt for password to have the user enter this password each time to access the protocol, or select Use following password to use the protocol without entering a password each time you use the CK32 I-Safe. 8 (Optional) Tap Get Certificates to obtain or import server certificates. For help with certificates, see “Loading a Certificate” on page 76. 9 Tap Additional Settings to assign an inner TTLS authentication, inner EAP, and set options for server certificate validation and trust. 70 CK32 I-Safe Handheld Computer User’s Manual Chapter 3 — Configuring the CK32 I-Safe 10 From the Inner TTLS Authentication list, choose PAP, CHAP, MS-CHAP, MS-CHAP-V2, PAP/Token Card, or EAP. 11 If you select EAP for the inner authentication protocol, select an inner EAP protocol from the Inner EAP list. 12 Check Validate Server Certificate to verify the identity of the authentication server based on its certificate when using PEAP. 13 Tap Root CA, select a root certificate, and then tap OK. 14 Enter the Common Names of trusted servers. 15 For Anonymous EAP-TTLS Name, type an outer identity to protect your login name or identity. 16 Tap OK. Configuring LEAP Security With Profile Wizard LEAP is the Cisco Lightweight version of EAP. To configure LEAP security 1 In the Profile Wizard, select the Security page. 2 For 8021x Security, choose LEAP. 3 For Association, choose Open, WPA, WPA2, or Network EAP. CK32 I-Safe Handheld Computer User’s Manual 71 Chapter 3 — Configuring the CK32 I-Safe 4 For Encryption, choose TKIP or AES if you selected WPA2 for association, or WEP or CKIP if you selected Network EAP for association. 5 For Username, type a unique username for this protocol. 6 In the Password field, type a unique password for this protocol. 7 Select Prompt for password to have the user enter this password each time to access the protocol, or select Use following password to use the protocol without entering a password each time you use the CK32 I-Safe. 8 Tap OK. Configuring EAP-FAST with Profile Wizard The EAP-FAST protocol is a client-server security architecture that encrypts EAP transactions with a TLS tunnel. While similar to PEAP, EAP-FAST differs significantly since tunnel establishment is based on strong secrets unique to users. These secrets are called Protected Access Credentials (PACs), which CiscoSecure ACS generates using a master key known only to CicsoSecure ACS. EAP-FAST does not require certificate management. 1 In the Profile Wizard, select the Security page. 2 For 8021x Security, choose EAP-FAST. 3 For Association, choose Open, WPA, WPA2, or Network EAP. 4 For Encryption, choose WEP or CKIP if you selected Network EAP for association. 5 For Username, type a unique username for this protocol. 6 In the Password field, type a unique password for this protocol. 7 Select Prompt for password to have the user enter this password each time to access the protocol, or select Use following password to use the protocol without entering a password each time you use the CK32 I-Safe. 8 Tap Additional Settings to set options for PAC management and assign an anonymous EAP-FAST name. 72 CK32 I-Safe Handheld Computer User’s Manual Chapter 3 — Configuring the CK32 I-Safe 9 Tap PAC Manager to view the PAC files currently installed on the CK32 I-Safe. Tap ok to return to the Additional Settings screen. 10 If you already have a PAC on the CK32 I-Safe, clear Allow Automatic PAC provisioning to avoid receiving more PACs from the server. 11 If Allow Automatic PAC provisioning is selected, you can check: • Prompt before acquiring a new PAC for notification of any incoming PACs. • Prompt before replacing a PAC for notification whether to replace a current PAC with an incoming PAC. 12 For Anonymous EAP-FAST Name, type the outer identity assigned for public usage. 13 Tap OK. Configuring Microsoft Security The default security setting is Funk. If you want to use Microsoft security, you need to select it as your security choice. After you select Microsoft as your security choice, you will be prompted to save your settings and reset your computer for your change to take effect. To select Microsoft security as your security choice 1 Select Start > Settings > the System tab > Intermec Settings. The Intermec Settings application appears. 2 Select Communications > 802.11 Radio > Security Choice. CK32 I-Safe Handheld Computer User’s Manual 73 Chapter 3 — Configuring the CK32 I-Safe 3 From the Security Choice list, select Microsoft Security and save your settings. An alert box appears telling you that you must save your settings and warm boot the CV30 for the new security choice to take effect. 4 An alert box appears telling you that you must save your settings and warm boot the CK32 I-Safe for the new security choice to take effect. Tap Yes to warm boot the CK32 I-Safe with Microsoft Security as the Security Choice. 74 CK32 I-Safe Handheld Computer User’s Manual Chapter 3 — Configuring the CK32 I-Safe Networks already configured are preferred networks. You can connect to only preferred networks or search for and connect to any available network. You can add a wireless network when the network is detected or manually by entering settings information. To determine if authentication information is needed, see your network administrator. When the CK32 I-Safe restarts with Microsoft selected as the security choice, a dialog box with your wireless network information appears. You can connect to an existing preferred connection or set up a new connection. The following information is for setting up a new connection. To configure Microsoft security for a new connection 1 In the radio network connection dialog box, double-tap Add New. 2 Enter a network name. If the network was detected, the network name is entered and cannot be changed. 3 (Optional) To connect to an ad-hoc connection, select This is a computer-to-computer (ad-hoc) network; wireless access points are not used. 4 Follow these steps to disable authentication: a Set Authentication to Open if WEP keys are not required or to Shared when WEP keys are required for association. b Set Data Encryption to Disabled. Follow these steps to enable WEP encryption: a Set Authentication to Open if WEP keys are not required or to Shared when WEP keys are required for association. b Set Data Encryption to WEP. c To change the network key, clear The key is provided automatically check box, enter the new Network key, and then select the appropriate Key index. Follow these steps to enable WPA authentication: a Set Authentication to WPA. b Set Data Encryption to either WEP or TKIP. CK32 I-Safe Handheld Computer User’s Manual 75 Chapter 3 — Configuring the CK32 I-Safe Follow these steps to enable WPA authentication using a preshared key: a Set Authentication to WPA-PSK. b Set Data Encryption to either WEP or TKIP. c Enter the new Network key. 5 From the EAP type list, select either MD5-Challenge, PEAP or TLS. 6 Tap OK to close the screen. Note: If you select to automatically connect to non-preferred networks, the CK32 I-Safe detects any new networks and provides you with the opportunity to configure them. Loading a Certificate If you choose to use transport layer security (TLS) with WPA or 802.1x security, you need to have a unique client certificate on the CK32 I-Safe and a trusted root certificate authority (CA) certificate. You can use a third-party CA to issue unique client certificates and a root certificate. There are three ways to load certificates on the CK32 I-Safe: • If you are using Active Directory to issue certificates, you can use the Enroll Certificates application to load the certificates. • If you are using another third-party CA, you can use the Import Certificates application to load the certificates. • If you have multiple certificates to install, you can use the Import Root Certificates and Import User Certificates functions. Note: For certificates to be valid, the CK32 I-Safe must be set to the correct date and time. After cold booting the CK32 I-Safe, you may need to correct the date and time. To load certificates if you are using Active Directory 1 Configure the network and radio settings for the CK32 I-Safe to communicate with your certificate authority or establish an ActiveSync connection with the CA. 76 CK32 I-Safe Handheld Computer User’s Manual Chapter 3 — Configuring the CK32 I-Safe 2 From Intermec Settings, select Communications > 802.11 Radio > Certificates. 3 Select Enroll Certificates and tap the Run App button. The Enroll Certificates dialog box appears. 4 In the Enroll Certificates dialog box, enter the User Name, Password, and Server (IP address) to log into the CA server. 5 Tap OK. A dialog box appears asking if you want to load the root certificate. 6 Tap OK for yes. The Enrollment Tool message box appears telling you that the user certificate has been added. 7 Tap OK to close the Enrollment Tool message box. 8 Configure your CK32 I-Safe for WPA, or 802.1x security. To load certificates if you are using a third-party CA 1 From Intermec Settings, select Communications > 802.11 Radio > Certificates. 2 Select Import Certificates and tap the Run App button. The certificates application appears. 3 Tap in the Import pfx Certificate box and navigate to your private .pfx file. 4 Select the file and the path to your .pfx file now appears in the text box. 5 Tap Import Certificate. A dialog box appears asking if you want to add the certificate to the root store. 6 Press OK to add the certificate. A message box appears telling you that the root certificate has been imported. 7 Tap OK to close the Success message box. 8 Tap Import User Cert. A dialog box appears telling you that the user certificate and the associated key were successfully imported. 9 Tap OK to close the Success message box. 10 Configure your CK32 I-Safe for WPA, or 802.1x security. CK32 I-Safe Handheld Computer User’s Manual 77 Chapter 3 — Configuring the CK32 I-Safe To load multiple certificates 1 Create the \Temp\Root and the \Temp\User folders on the CK32 I-Safe. 2 Copy at least one root certificate .cer file into the \Temp\Root folder. 3 Copy at least one user certificate .cer file and key .pvk file into the \Temp\User folder. The filenames must match (for example, cert1.cer and cert1.pvk). 4 From Intermec Settings, select Communications > 802.11 Radio > Certificates. 5 Select Import Root Certificates = False. Choose True from the drop-down menu. 6 Select Import User Certificates = False. Choose True from the drop-down menu. 7 Exit Intermec Settings and save your settings. The certificates are immediately imported: a All root certificates in \Temp\Root are imported into the Trusted Authorities certificate store. Note: You are prompted when a root certificate is imported, unless that certificate is already in the store. b All certificate and key files in \Temp\User are imported into the My Certificates certificate store. c The Import Root Certificates and the Import User Certificates settings are changed from True to False. 8 Configure your CK32 I-Safe for WPA, or 802.1x security. 78 CK32 I-Safe Handheld Computer User’s Manual Chapter 3 — Configuring the CK32 I-Safe Disabling Security If you choose not to use security with your wireless network, you can disable it on the CK32 I-Safe. Intermec recommends that you always set security in your network. To disable security 1 Open Intermec Settings. 2 Choose Communications > 802.11 Radio > Microsoft Security. 3 For Network Authentication, choose Open. 4 For Data Encryption, choose Disabled. 5 Close Intermec Settings. CK32 I-Safe Handheld Computer User’s Manual 79 Chapter 3 — Configuring the CK32 I-Safe 80 CK32 I-Safe Handheld Computer User’s Manual 4 Developing and Installing Applications Use this chapter to understand the guidelines for developing applications and converting existing Trakker Antares applications for use on the CK32 I-Safe. You will also find information on installing applications and automatically launching them. This chapter contains these sections: • Developing Applications for the CK32 I-Safe • Installing Applications on the CK32 I-Safe • Launching an Application Automatically CK32 I-Safe Handheld Computer Users Manual 81 Chapter 4— Developing and Installing Applications Developing Applications for the CK32 I-Safe The CK32 I-Safe Handheld Computers run applications programmed in Microsoft Visual Studio 2003 or later. You can also use Microsoft eMbedded Visual C++ version 4.2 or later, but some features may not be available. Use this section to understand the hardware and software you need to: • develop a new application for the CK32 I-Safe. • develop a web-based application for the CK32 I-Safe. • convert a Trakker Antares application to a CK32 I-Safe application. Developing a New Application Using the Intermec Developer Library Use the Intermec resource kits to develop new applications to run on the CK32 I-Safe. The Intermec resource kits are a library of C#, C++, and .NET components grouped by functionality that you can use to create applications for the CK32 I-Safe. The resource kits are part of the Intermec Developer Library (IDL), and can be downloaded from the Intermec web site at www.intermec.com/idl. At a minimum, you need the following hardware and software components to use the Intermec resource kits: • Pentium PC, 400 MHz or higher • Windows 2000 (Service Pack 2 or later) or Windows XP (Home, Professional, or Server) • For native and managed development, Microsoft Visual Studio 2005 • 128 MB RAM (196 MB recommended) • 360 MB hard drive space for minimum installation (720 MB for complete) • CD-ROM drive compatible with multimedia PC specification • VGA or higher-resolution monitor (Super VGA recommended) • Microsoft Mouse or compatible pointing device 82 CK32 I-Safe Handheld Computer Users Manual Chapter 4 — Developing and Installing Applications Developing a Web-Based Application You can develop web-based data collection applications for use on the CK32 I-Safe. For help, see any HTML source book. The CK32 I-Safe contains Internet Explorer Mobile for you to use. Microsoft Internet Explorer Mobile is available from the Start menu and provides all of the common elements you expect to find. Converting a Trakker Antares Application for the CK32 I-Safe If you have an existing Trakker Antares application that you would like to run on the CK32 I-Safe, you can use the Antares Migration Resource Kit to convert it. The Antares Migration Resource Kit is a set of libraries and tools that you use to convert your existing Trakker Antares C applications into C++ applications for use on the CK32 I-Safe. The CK32 I-Safe does not support all Trakker Antares functions. You may need to rewrite parts of your application when converting it for use on the CK32 I-Safe. See the resource kit for a list of functions that are not supported. You need these hardware and software components to use the resource kit: • PC with at least 100 MB of free disk space running Microsoft Windows 2000/XP • Microsoft Visual Studio 2003 (or later) • Microsoft eMbedded Visual C++ version 4.2 or later • Antares Migration Resource Kit (from IDL 2.4 or later) The resource kit is part of the Intermec Developer Library (IDL), which you can download from the Intermec web site at www.intermec.com/idl. CK32 I-Safe Handheld Computer Users Manual 83 Chapter 4— Developing and Installing Applications Installing Applications on the CK32 I-Safe There are several ways you can install applications on the CK32 I-Safe: • You can package your application as a cabinet (.cab) file. • If you have a simple application, you may only need to deliver the .exe file. • You can copy a directory structure that contains the application, supporting files, DLLs, images, and data files. Intermec recommends using .cab files to install your applications. The CK32 I-Safe uses standard Windows Mobile .cab files and will install third-party .cab files. You can have your .cab files place your application in any of these memory locations on the CK32 I-Safe: • Applications can be installed into the Object Store or the Flash File Store. Both locations are virtual partitions on the embedded storage card in the system. The Object Store will be erased during a ‘clean’ boot, but the Flash File store will persist. Neither location will be erased during a normal reset of the system. The registry always persists to the Object Store region for normal resets. If you need files and/or registry entries to persist through a ‘clean’ boot, it is suggested that you use a cab file installed from the Flash File Store area. For more information on ‘clean’ boots, see “Resetting Your Computer” on page 110. There are several ways you can install files and applications on the CK32 I-Safe: • SmartSystems server • ActiveSync • Wavelink Avalanche The following sections explain how to use each one of these processes to install your application on the CK32 I-Safe. 84 CK32 I-Safe Handheld Computer Users Manual Chapter 4 — Developing and Installing Applications Installing Applications Using SmartSystems Foundation You can use the SmartSystems server to drag-and-drop Intermec applications onto your CK32 I-Safe. The CK32 I-Safe ships with the SmartSystems client, which means it is SmartSystemsenabled. The console is part of SmartSystems Foundation, which you can download from www.intermec.com/SmartSystems. For help using the console, see the online help. To install an application using SmartSystems Foundation 1 Download your application file to your desktop PC. 2 Double-click the application file to install it. The application file should appear in the software vault. 3 From the SmartSystems console in the Software Vault, drag-and-drop the application onto each CK32 I-Safe in your network. Installing Applications Using Microsoft ActiveSync You can use Microsoft ActiveSync to establish a connection between your PC and the CK32 I-Safe. ActiveSync transfers files, synchronizes files, performs remote debugging, and other device management activities. For more information on ActiveSync see “Using Microsoft ActiveSync” on page 32. You can have a USB or 802.11 b/g ActiveSync connection to the CK32 I-Safe. When you only have a few CK32 I-Safes to update, you can copy files using Windows Explorer on a PC. This procedure assumes that Microsoft ActiveSync is installed on your PC and is up and running. To install an application using ActiveSync 1 Use the AN1 Communications Adapter to connect the CK32 I-Safe to a PC or host via the USB port. Intrinsically Safe rules prohibit direct connection to the CK32 I-Safe. You may have to disconnect and then connect the cable to “wake” the connection. CK32 I-Safe Handheld Computer Users Manual 85 Chapter 4— Developing and Installing Applications 2 Wait for a “Connected” message to appear in the Microsoft ActiveSync application to signal a connection to the CK32 I-Safe. If necessary, select File > Get Connected to initiate a connection. 3 Click Tools > Explore Device to open the Mobile Device window on the CK32 I-Safe. 4 On your desktop PC, locate the .cab file you want to download to the CK32 I-Safe and copy it. 86 CK32 I-Safe Handheld Computer Users Manual Chapter 4 — Developing and Installing Applications 5 From the Mobile Device window, open the My Windows Mobile-Based Device folder and navigate to the folder where you want to paste the .cab file. 6 Paste the .cab file into the desired folder. 7 When you are done copying files, reset the CK32 I-Safe. 8 After the CK32 I-Safe is done resetting, tap Start > Programs > File Explorer to locate the newly copied files. 9 Tap the .cab files to install them. Installing Applications Using Wavelink Avalanche You can use the Wavelink Avalanche device management system to install applications on all of your wireless CK32 I-Safes. The CK32 I-Safe ships with the Avalanche Enabler already loaded on it. In order to use Avalanche Enabler you must also have the Avalanche Administrative Console installed on your PC. To install Avalanche Enabler 1 Tap Start > Programs > File Explorer and navigate to the Windows folder. 2 Locate and tap InstallSelect to launch the application CK32 I-Safe Handheld Computer Users Manual 87 Chapter 4— Developing and Installing Applications 3 Tap OK on the Install Select Caution dialog. 88 CK32 I-Safe Handheld Computer Users Manual Chapter 4 — Developing and Installing Applications 4 Select Avalanche Enabler and tap the Apply button. 5 You will need to clean boot the CK32 I-Safe to install the selected files. Tap Yes to initiate a clean boot. For help, see “Performing a Clean Boot” on page 111. This completes the installation process for Install Select. Each time the Avalanche Enabler is activated (typically on a reset), the CK32 I-Safe attempts to connect to the Avalanche Agent. When the CK32 I-Safe connects to the agent, the agent determines whether an update is available and immediately starts the software upgrade, file transfer, or configuration update. You can now install software packages and updates for the CK32 I-Safe using the Avalanche Administrative Console. Schedule the CK32 I-Safe updates or manually initiate an update using the Avalanche Administrative Console. CK32 I-Safe Handheld Computer Users Manual 89 Chapter 4— Developing and Installing Applications For more information on using Wavelink Avalanche, contact your local Intermec representative or visit the Wavelink web site at www.wavelink.com. Launching An Application Automatically Note: This describes the system component startup for Intermec provided components only. It does not describe the bootstrap loader process. It only describes the component installation process provided by Windows Mobile. It is assumed that you understand the Microsoft Mobile startup procedures and are familiar with how Microsoft components start up. You can configure the various media used in the Windows Mobile system with a folder name and can change the media in the registry of the system. Many of the startup components rely on folder names to locate information files, applications, or other related data. During normal Windows Mobile system startup, there are Intermec-specific and non-Intermec components that require an orderly start to properly function. These non-Intermec components may also need to start themselves so the Windows Mobile device can function properly. Since there are possible configurations that come from using one or more optional builtin peripheral devices, the platform components starting on the next page are required to manage startup. RunAutoRun System components are installed and configured during the power up process from a single starting point. RunAutoRun (RunAutoRun.exe), built into the operating system image and located in the “\Windows\Startup” folder, checks for AutoExec (AutoExec.exe) in a “2577” directory on a mounted volume in this order: miniSD, Object Store (or User Store), which may be non-volatile storage or RAM, and Flash File Store which may map as Object Store (default location for the AutoExec program in Intermec systems). Intermec system applications start from this folder. However, the ordering of mounted volumes does override this feature. 90 CK32 I-Safe Handheld Computer Users Manual Chapter 4 — Developing and Installing Applications Folder names used for the mounted volumes above are retrieved from the registry to maintain coherence with the naming of the mounted volumes on the platform. These folder names are not hard-coded. If AutoExec is present in the “\SYSTEM” folder on any of these media, it executes the program only on the first media it is found on and no other. AutoExec is reserved for Intermec use to configure Intermecspecific applications. It launches the .cab installer, AutoCab (AutoCab.exe), to install platform .cab files to the system, such as the SSPB. When the AutoExec is complete, RunAutorun then checks for the existence of AutoRun (AutoRun.exe) and executes this program from the first media it is found on. This order is the same as what is used by AutoExec. AutoRun is reserved for customer use to configure application launch sequences. It launches the AutoCab installer and any customer programs added to the AutoUser.dat file. Shown is the hierarchy of these files. AutoExec AutoExec (AutoExec.exe) automates operations such as pausing, launching processes, or signaling, and is configured through the AutoExec data file (AutoExec.dat). This script file must be in the same directory as the program itself. Note: Intermec considers the usage of the AutoExec data file as “Intermec Private.” AutoExec installs Intermec applications such as Data Collection, Security Supplicants, Intermec Management, applets, and shortcuts from components found in the Flash File System. Do not modify the AutoExec data file. Instead, use the AutoRun program to add software components. Usage: AutoExec [-%[W]] [-E=["X"]] [-F=["Y"]] [-LOG=] [-W=[Z]] CK32 I-Safe Handheld Computer Users Manual 91 Chapter 4— Developing and Installing Applications AutoExec Commands Command Description -% Passes an ID to use in a call to SignalStarted. This argument is useful only during system startup that relies on a SignalStarted to call. W is an integer value. Passes a signal event name to use when autoexec completes. X is a string value. Overrides the data file to use. This must be a fully qualified name. Default is “autoexec.dat” in the same location as the AutoExec.exe program. “Y” is a string value. Set to any value logs activity to AutoExec.txt (in the same location as the AutoExec.exe program). Default is disabled. Pauses the autoexec process by calling sleep for the number of seconds specified by Z. Z is an integer value. -E -F -LOG -W Process return code uses standard error codes defined in WinError.h. AutoExec Keywords Keyword Description -% Passes an ID to use in a call to SignalStarted. This argument is useful only during system startup that relies on a SignalStarted to call. W is an integer value. Passes a signal event name to use when autoexec completes. X is a string value. Overrides the data file to use. This must be a fully qualified name. Default is “autoexec.dat” in the same location as the AutoExec.exe program. “Y” is a string value. Set to any value logs activity to AutoExec.txt (in the same location as the AutoExec.exe program). Default is disabled. Pauses the autoexec process by calling sleep for the number of seconds specified by Z. Z is an integer value. -E -F -LOG -W 92 CK32 I-Safe Handheld Computer Users Manual Chapter 4 — Developing and Installing Applications There are two ways to automatically launch your application when you perform a reset on the CK32 I-Safe: • Make sure your .cab file places a shortcut to your application in the \Windows\StartUp folder. • Configure the AutoRun program to launch your application. The CK32 I-Safe contains a program called AutoRun.exe which automates operations such as launching other processes. You can configure AutoRun.exe through the AutoRun data file, AutoRun.dat. This script file must be located in the same directory as the program. AutoRun AutoRun (AutoRun.exe) automates operations such as launching other processes and is configured through the AutoRun data file (AutoRun.dat). This file must be in the same directory as the program itself. AutoRun supports the following script commands in AutoUser.dat and AutoRun.dat. Note: If you need to add steps at boot time, add them to AutoUser.dat, not to AutoRun.dat. AutoRun.dat is provided by Intermec and is subject to change. AutoUser.dat is the designated place to add steps to the boot time process. Command Description EXEC Launches a specified program, waits for it to complete (up to 10 minutes). Processes a specified file of commands and returns. Processes a specified file of commands and does not return. Loads a specified program and executes it. Loads a specified program and executes it. CALL CHAIN RUN LOAD CK32 I-Safe Handheld Computer Users Manual 93 Chapter 4— Developing and Installing Applications AutoRun handles quoted file names for the first parameter to allow specifying path names or file names that contain white space. Note only one set of quotes per command is supported. AutoRun.dat entry examples Command Description RUN CALL “Flash File Store\Apps\some.exe” arg1, arg2, arg3 “Flash File Store\2577\usercmds.dat” AutoRun supports the following script commands in AutoRun.dat: AutoRun Script Commands Command Description QUIET LOGGING SIGNAL Enables user notification when an error occurs. Enables logging to a trace file. Enables the specified named event and is immediately signaled. Useful for notifying other components of the current status. Opens another .dat file to process. After the called file is completed, this file is resumed. Runs a program with a SW_SHOWNORMAL attribute. Autoexec does not wait for the child process to exit. Runs a program with a SW_HIDE attribute. Autoexec waits for 60 seconds for the child process to exit or EXECWAIT seconds if set. Runs the specified program. AutoExec waits 60 seconds for the child process to exit or EXECWAIT seconds if set. Changes the default EXEC wait time from 60 seconds to the number of seconds specified. There is a maximum 10-minute limit imposed. Forces a sleep for the specified number of seconds to occur. Forces a sleep until the named event is signaled. CALL RUN LOAD EXEC EXECWAIT WAIT WAITFOR Examples of keyword usage: ; Allow message pop up if an error occurs. QUIET 0 94 CK32 I-Safe Handheld Computer Users Manual Chapter 4 — Developing and Installing Applications ; Log any debug output to a trace file. LOGGING 1 ; Perform a SetEvent on the event name "autoexec_started". SIGNAL "autoexec_started" ; Include this child data file, childexec.dat. CALL "\childexec.dat" ; Use autocopy to copy the audio control panel from flash file store to the windows directory. Wait for up to 60 seconds for it to exit. EXEC "\Flash File Store\SYSTEM\autocopy.exe" -S"\Flash File Store\System\CPLAudio.cpl" -D"\Windows\CPLAudio.cpl" ; Change the default EXEC wait time to 90 seconds. EXECWAIT 90 ; Suspend processing any commands for 10 seconds. WAIT 10 ; Suspend processing any commands until event called MyEventName is signaled. WAITFOR "MyEventName" AutoCopy AutoCopy (AutoCopy.exe) copies/moves files between locations. It has no user interface and is configured through command line arguments. It has support for the following parameters, in no particular order: Usage: AutoCopy [-D["W"]] [-L["X"]] [-M[D]] [-Q[Y]] [-S["Z"]] AutoCopy Script Commands Command Description -D Indicates the destination file name and must be fully qualified. W is a string value. Indicates a fully qualified file name for logging to enable. Default is disabled. X is a string value. Moves file to a destination rather than copies the file. Default value is disabled. D is an integer value. D=1 indicates enabled, 0 is disabled. Indicates if a message box should appear when an error occurs. Default is disabled. Y is an integer value. Indicates a source file name and must be fully qualified. Z is a string value. -L -M -Q -S Process return code uses standard error codes defined in WinError.h. CK32 I-Safe Handheld Computer Users Manual 95 Chapter 4— Developing and Installing Applications Example: ; use AutoCopy to copy the control panel from flash file store to windows. autocopy.exe -S"\Flash File Store\System\Audio.cpl" D"\Windows\Audio.cpl" ; use AutoCopy to move the control panel from flash file store to windows. autocopy.exe -M1 -S"\Flash File Store\System\Audio.cpl" D"\Windows\Audio.cpl" AutoReg The AutoReg (AutoReg.exe) component adds registry information to the Windows Mobile registry. It has no user interface and is configured through command line arguments. Usage: AutoReg [-D] [-HKey] [-Q] “filename” AutoReg Script Commands Command Description -D Deletes the registry file after successfully loading it. This allows for systems that have hives implemented. Saves the registry path, and all child entries, to the specific .REG registry file. Indicates whether a message box should appear when a fatal error occurs. Fully qualified file name to read from or write to, encased in double quotes to support spaces in paths or file names. See examples below. -H -Q filename Process return code uses standard error codes defined in WinError.h. Example: ; use AutoReg to install this registry information. autoreg.exe "\Flash File Store\install.reg" ; use AutoReg to install this registry information. Delete the file afterwards. autoreg.exe -D "\Flash File Store\install.reg" ; use AutoReg to extract registry information to a file. autoreg.exe -HHKEY_LOCAL_MACHINE\Software\Intermec\Version "\version.reg" 96 CK32 I-Safe Handheld Computer Users Manual Chapter 4 — Developing and Installing Applications The format of the input file, in this example, is the standard registry format which should ease the creation of the input file since there are many publicly available utilities to generate a registry file besides Notepad. One example of a tool is the Microsoft Remote Registry Editor. AutoCab AutoCab (AutoCab.exe) extracts files, registry settings, and shortcuts from Windows Mobile cabinet (.cab) files. The Windows Mobile startup sequence invokes AutoCab as a part of AutoExec and AutoRun. During the Windows Mobile startup sequence, AutoCab processes all CAB files in the “\CabFiles” directory relative to the current location of Autocab, unless the location is overridden by command line arguments. AutoCab can run as a stand-alone program to install a CAB file or a directory of CAB files. AutoCab only installs the CAB file if it was not installed before by AutoCab. To track the installation of a .cab file, AutoCab marks the .cab file with the System attribute. This attribute is ignored if the device is performing a clean-boot on a nonpersistent file system. AutoCab preserves the .cab file after installation if the ReadOnly attribute is set. If not set, the .cab file is deleted automatically after installation. Command line switches are described as follows. Usage: AutoCab [-ChkRst=][-File=][-Force][-Log=][-Move=][-Quiet=][-Show=][Signal=] Ifreferences a single .cab file, that file is processed. If references a directory, all the .cab files in that directory is processed. If is a wild card pattern, all files matching that pattern is processed, If is omitted, InstallCab processes all the .cab files in directory “\CabFiles.” CK32 I-Safe Handheld Computer Users Manual 97 Chapter 4— Developing and Installing Applications AutoCab Script Commands Command Description -ChkRst= Set to 1 to configure AutoCab to check for the Reset flag after all .cab files are installed. This file is created by .cab files that want a clean reset after installation. Default is 0 (do not check for flag). Specifies the .cab files to extract. Note that the specified files need not end with the .cab extension. Forces the specified .cab files to extract regardless of whether it was previously extracted. Set to 1 to create a log file in the same folder that AutoCab is running. Useful for debugging .cab installation. Default is 0 (disabled). Set to 1 to force source .cab file deletion, even when read-only bit set on file. Default is 0 (disabled). Set to 0 to allow AutoCab to display user message box on errors. Useful for debugging .cab installation. Default is 1 (keep quiet). Set to 0 to prevent showing any installation progress interfaces and also prevents canceling the installation. Set to 1 to show normal installation. Set to 2 to show Intermec installation progress interface (user can see what is installing but cannot cancel it). Default is 1 (show normal). Set to string name of signal to use at the completion of .cab installation before a reboot occurs (if enabled). AutoCab uses WaitForSingleObject on this name. Default is disabled. -File= -Force -Log= -Move= -Quiet= -Show= -Signal= Example: ; Install all cab files in the \Flash File Store\XYZ directory, regardless. AutoCab -FILE="\Flash File Store\XYZ\.cab" -FORCE ; Install only one cab file, use Intermec cab installation display AutoCab -FILE=”\myCab\app.cab” =show=2 98 CK32 I-Safe Handheld Computer Users Manual 5 Troubleshooting and Maintenance Use this chapter to solve problems you may encounter while using the CK32 I-Safe. You will also find information on booting the computer and routine maintenance. If you have any problems using the CK32 I-Safe, look in this chapter to find a possible solution. This chapter consists of the following section. • Upgrading the CK32 I-Safe Using SmartSystems • Contacting Product Support • Troubleshooting the CK32 I-Safe • Resetting Your Computer • Cleaning the Scanner Window, Screen, and Computer CK32 I-Safe Handheld Computer User’s Manual 99 Chapter 5— Troubleshooting and Maintenance Upgrading the CK32 I-Safe Using SmartSystems You can use the SmartSystems™ Foundation application from Intermec to perform operating system upgrades on your CK32 I-Safe. SmartSystems client is installed on your CK32-I-Safe, which means it is SmartSystems-enabled. The console is part of SmartSystems Foundation, which you can download from www.intermec.com/SmartSystems. When you upgrade the operating system, you erase the current configuration and replace it with the new default configuration. You will need to reset the network parameters on the CK32 I-Safe to reestablish communications with other devices in the network. In other words, if you upgrade the operating system and the default registry from the operating system has changed, the registry is rolled back to the new default. When you upgrade your CK32 I-Safe , you are updating the operating system (OS) and the SmartSystems Platform Bundle (SSPB) files. The SSPB files are stored on the Flash File Store, and deliver Intermec Value Add (IVA) functionality such as data collection, configuration, and wireless security. As new features are added to these components, you can upgrade your SSPB files without needing to upgrade the operating system. Similarly, features added to the operating system do not affect the functionality of the SSPB, and you can choose to upgrade only the operating system. If you choose to update only the operating system, the SSPB will need to be re-installed. If you are upgrading the OS and SSPB files, you first install the OS upgrade and then you install the SSPB upgrade. The installation process is very similar for both type of upgrade but the way the files install is different. Downloading the Upgrade Files You need to download the latest upgrade files from the Intermec web site to your desktop computer. To download the upgrade files 1 Start your web browser and go to the Intermec web site at www.intermec.com. 2 Go to Service & Support > Downloads. 100 CK32 I-Safe Handheld Computer User’s Manual Chapter 5— Troubleshooting and Maintenance 3 Select Computers: CK32 I-Safe Mobile Computer from the list. 4 Select the download you need. Make sure the download you select is for the CK32 I-Safe computer and that it contains the upgrade you want: operating system only, SSPB only, or operating system and SSPB. 5 Download the .zip file to your desktop computer. 6 Use the SmartSystems server to upgrade the CK32 I-Safe. Note: You cannot install the files for the OS and the SSPB bundle at the same time. You need to install one and then install the other or install only the bundle that you need to upgrade. To Upgrade the Operating System 1 Connect your the CK32 I-Safe to your network that has the SmartSystem Server installed. 2 Install SmartSystems Foundation on your desktop or laptop computer, then double-click the icon on your toolbar to start the SmartSystems Console. 3 Double-click the SmartSystems icon on your taskbar to start the SmartSystems Console. CK32 I-Safe Handheld Computer User’s Manual 101 Chapter 5— Troubleshooting and Maintenance The SmartSystem Console screen has three sections: • Keypad Computers (devices you are using) • SmartSystem Applications (used to upgrade) • Software Vault (where your upgrades are stored) 4 Click the Discover icon on the SmartSystems Console. Your CK32 I-Safe should appear in the Keypad Computers area of the screen. 5 Click and drag the OS bundle from the Software Vault and drag to the C32 I-Safe icon. Release the OS bundle on the device icon and the following message will appear. 6 Click the Yes button and SmartSystems Server will start transferring files to the CK32 I-Safe. A white screen with text on it will appear on the CK32 I-Safe icon as the files are being downloaded. Make sure that the CK32 I-Safe does not suspend during the download or errors could occur. When the file download is complete, the CK32 I-Safe performs a warm boot and starts to install the upgrade files. After the OS file installation is completed, the CK32 I-Safe warm boots again and the Windows Mobile welcome screen appears. You will need to recalibrate the screen at this time. To upgrade the SSPB 1 Connect your the CK32 I-Safe to your network that has the SmartSystem Server installed. 2 Install SmartSystems Foundation on your desktop or laptop computer, then double-click the icon on your toolbar to start the SmartSystems Console. 102 CK32 I-Safe Handheld Computer User’s Manual Chapter 5— Troubleshooting and Maintenance 3 Double-click the SmartSystems icon on your taskbar to start the SmartSystems Console. 4 Click the Discover icon on the SmartSystems Console. Your CK32 I-Safe should appear in the Keypad Computers area of the screen. 5 Click and drag the SSPB bundle from the Software Vault and drag to the C32 I-Safe icon. Release the SSPB bundle on the device icon. 6 Click the Yes button when the SmartSystem message appears. The SmartSystems Server will start transferring files to the CK32 I-Safe. A white screen with text on it will appear on the CK32 I-Safe icon as the files are being downloaded. Make sure that the CK32 I-Safe does not suspend during the download or errors could occur. When the file download is complete, the CK32 I-Safe performs a warm boot and starts to install the upgrade files. When the Today screen appears, SSPB file installation begins. After all files are installed, you will need to reconnect the CK32 I-Safe to your network. Contacting Product Support If you cannot find the answer to your problem in the “Troubleshooting the CK32 I-Safe” section, you can visit the Intermec technical knowledge base (Knowledgebase Central) at intermec.custhelp.com to review technical information or to request technical support. To talk to an Intermec Product Support representative, call 1-800-755-5505. Before you call Intermec Product Support, make sure you have the following information ready: • Operating system version • Configuration number • If you are using security, know the type (Funk or Microsoft) and the full set of parameters CK32 I-Safe Handheld Computer User’s Manual 103 Chapter 5— Troubleshooting and Maintenance • Power management settings • If you are using terminal emulation (TE), know the version and protocol • If you are not using TE, know the language your custom application was written in and the tools you used to create it You can find most of the information listed above in Intermec Diagnostics or Intermec Settings. Consult your application developer for information on your custom application. To find your operating system version • Tap Start > Internet Explorer > Intermec. An Intermec page opens and displays the Windows Mobile version loaded on your CK32 I-Safe. To find your configuration number • Look at the label on the back of the CK32 I-Safe. To open Intermec Settings • Tap Start > Settings > System > Intermec Settings. Troubleshooting the CK32 I-Safe If you send the CK32 I-Safe in for service, it is your responsibility to save the computer data and configuration. Intermec is responsible only for ensuring that the keypad and other hardware features match the original configuration when repairing or replacing your computer. Problems While Operating the CK32 I-Safe If you have trouble operating the CK32 I-Safe, check these problems and possible solutions. 104 CK32 I-Safe Handheld Computer User’s Manual Chapter 5— Troubleshooting and Maintenance Problems While Operating the CK32 I-Safe Problem Solutions You press the Power button to turn Make sure the backlight is on by pressing E. on the CK32 I-Safe and nothing Make sure you have a charged battery installed correctly. happens. For help, see “Charging and Installing the Battery” on page 5. The battery may be discharged. Replace the battery with a spare charged battery, or charge the battery and try again. The Battery light is blinking. The battery is running low. Replace the battery with a spare charged battery, or charge the battery. You use your stylus to tap the screen Recalibrate your touch screen. For help, see “Using the and nothing happens. Touch Screen” on page 14. The blue Ready-to-Work indicator Try these possible solutions: is off. The Ready-to-Work application (such as TE 2000) has not loaded successfully. For help, see the documentation or online help for the application. The CK32 I-Safe is not running a Ready-to-Work application. The blue Ready-to-Work indicator The Ready-to-Work application (such as TE 2000) may is blinking. be running, but is not connected to a host. Verify that the application is properly configured to communicate with the host. The blue Ready-to-Work indicator A connection has been established, and all network is on. connections are active. There is nothing to troubleshoot. CK32 I-Safe Handheld Computer User’s Manual 105 Chapter 5— Troubleshooting and Maintenance Problems While Configuring Security If you have trouble configuring the computer for security, check these problems and possible solutions. Problems While Configuring Security Problem Solution You are using static WEP keys and you have a strong connection to the access point, but you cannot communicate with it. You are setting up multiple access points in a network, with different SSIDs, and the connection fails. Make sure that you are using the correct static WEP key. The CK32 I-Safe does not save WEP key values when you change the SSID. Re-enter the WEP key value after you change the SSID and save your changes. You should now be able to connect to the different access points. You receive a message saying “The The correct date and time on the CK32 I-Safe are not server certificate has expired or your always saved through a cold boot. You need to re-enter the system date is incorrect” after you date and time, and then save your changes. cold boot the CK32 I-Safe. The CK32 I-Safe indicates that it is Make sure that: not authenticated • the User Name and Password on your CK32 I-Safe match the user name and password on your authentication server. You may need to reenter the password on both your CK32 I-Safe and authentication server. • on your authentication server, the user and group are allowed and the group policy is allowed to log in to the server. For help, see the documentation that shipped with your authentication server software. • the IP address and secret key for your access point must match the IP address and secret key on your authentication server. You may need to re-enter the IP address and secret key on both your access point and authentication server. 106 CK32 I-Safe Handheld Computer User’s Manual Chapter 5— Troubleshooting and Maintenance Problems with Wireless Connectivity If you have trouble with wireless connectivity, check these problems and possible solutions. Problems With Wireless Connectivity Problem Solution When you turn on the CK32 I-Safe after it was suspended for 10-15 minutes or longer, it can no longer send or receive messages over the network. The network connection icon is in the status bar, but the host computer is not receiving any data from the CK32 I-Safe. The host may have deactivated or lost your current terminal emulation session. In a TCP/IP direct connect network, you need to turn off the “Keep Alive” message (if possible) from the host so that the TCP session is maintained while a CK32 I-Safe is suspended. In a UDP Plus network, there may be a problem with the connection between the Intermec Application Server and the host computer. Check with your network administrator or see the user’s manual for the Intermec Application Server. In a TCP/IP network, there may be a problem with the connection between the access point and the host computer. Check with your network administrator or use your access point user’s manual. • The CK32 I-Safe is not connected to the access point. Make sure the access point is turned on and operating. You may also be using the CK32 I-Safe out of range of an access point. Try moving closer to an access point to re-establish communications. • Make sure the CK32 I-Safe is configured correctly for your network. The radio parameters on the CK32 ISafe must match the values set for all access points the CK32 I-Safe may communicate with. For help, see “Setting Up 802.11 Radio Communications” on page 45. • If you have an 802.11b radio, the radio initialization process may have failed. Try resetting the CK32 I-Safe. See “Resetting Your Computer” on page 110. • If you have tried these possible solutions and the no network connection icon still appears, you may have a defective radio card. For help, contact your local Intermec service representative. The no network connection icon )appears on the status bar. CK32 I-Safe Handheld Computer User’s Manual 107 Chapter 5— Troubleshooting and Maintenance Problems With Wireless Connectivity (continued) Problem Solution The CK32 I-Safe is connected to the Intermec Application Server or host computer and you move to a new site to collect data. The network connection icon was visible but now the no network connection icon ( ) is visible. While configuring or using wireless printing, you see the message, “The Bluetooth COM port does not exist [55]. This is probably because the computer was just resumed. Please wait a few seconds and try again.” You may have gone out of range of an access point. Try moving closer to an access point or to a different location to re-establish communications. Once you are in range again, the network connection icon appears again. Any data you collected while out of range is transmitted over the network If you recently resumed the CK32 I-Safe, wait a few seconds and try again. Otherwise, you need to make sure that the device you selected as the current wireless printer is a printer, is turned on, and is discoverable. To learn about the current wireless printer and the Bluetooth COM port, see ““Creating an Application That Lets You Print Wirelessly” on page 41. While configuring or using wireless Tap Yes to dismiss the message. Follow the instructions in printing, you see the message, “Setting Up Bluetooth Communications” on page 39 to “Bluetooth is off. Would you like to turn on the power to the Bluetooth radio. turn it on and continue?” 108 CK32 I-Safe Handheld Computer User’s Manual Chapter 5— Troubleshooting and Maintenance Problems While Scanning Bar Codes Problem Solution You may be too far from the bar code label. Move closer to the bar code label and try again. You may be scanning the bar code label “straight on.” Change the scanning angle and try again. You can test the effective range of the scanner. Move within 61 cm (2 feet) of a wall and try again. You must be within the scanning range to scan bar code labels. For help, see “Scanning Bar Codes” on page 18. When you release the Scan button Press the Scan button or pull the trigger again without or handle trigger, the red beam of scanning a bar code label. If the red beam is still on, light from the scanner does not turn contact your local Intermec service representative. off. The scanner does not read the bar The scanner window may be dirty. Clean the window code labels quickly, or the scanning with a solution of ammonia and water. Wipe dry. Do not beam seems to be faint or obscured. allow abrasive material to touch the window. You scan a valid bar code label to Try these possible solutions in order: enter data for your application. The The computer may have decoded the bar code label in a data decoded by the scan module symbology other than the label’s actual symbology. Try does not match the data encoded in scanning the bar code label again. Make sure you scan the the bar code label. entire label. To operate the computer quickly and efficiently, you should enable only the bar code symbologies that you are going to scan. You cannot see a red beam of light from the scanner when you press the Scan button and aim the scanner at a bar code label. CK32 I-Safe Handheld Computer User’s Manual 109 Chapter 5— Troubleshooting and Maintenance Resetting Your Computer You may need to reset your computer if: • the CK32 I-Safe completely stops responding • an application is locked up and stops responding • when you upgrade the firmware • when you reflash the CK32 I-Safe Preferred Reset Method This procedure is the recommended method in recovering the CK32 I-Safe. It performs a graceful system shutdown and no data is lost in the process. To recover the CK32 I-Safe • Press and hold the Power button for about 10 seconds. Secondary Reset Method If performing the preferred reset method does not restore system operation, try using the secondary reset method. This method does not guarantee that cached disk data will be saved, and as such, transactional data may be lost during the reset. All other data is preserved. To press the reset switch 1 Press the Power button to suspend the CK32 I-Safe. 2 With a bent paper clip or similar device, press the recessed reset switch on the CK32 I-Safe keypad. Reset Switch 110 CK32 I-Safe Handheld Computer User’s Manual Chapter 5— Troubleshooting and Maintenance Performing a Clean Boot If performing either reset method fails to restore system operation, you may have to perform a clean boot. This is a boot method which formats the Object Store (user store) to clean data and registry information from the CK32 I-Safe system and restore them to their factory-default state. The clean boot process will erase the memory in the CK32 ISafe, including all applications and data files found in the object store. To preserve application programs through a clean boot they must be stored in the Flash File Store. To perform a clean boot 1 Press the Power button to suspend the CK32 I-Safe. 2 With a bent paper clip or similar device, press the recessed reset switch on the CK32 I-Safe keypad. 3 Press and hold the Power button until a Warning message appears on the display, release the Power button, then read the message. 4 Press and release the right side of the Scan button to perform a clean boot. Press and release the left side of the Scan button to cancel the clean boot. Cleaning the Scanner Window, Screen, and Computer To keep the computer in good working order, you may need to perform these minor maintenance tasks: • clean the scanner window • clean the screen • clean the computer housing and handle CK32 I-Safe Handheld Computer User’s Manual 111 Chapter 5— Troubleshooting and Maintenance Cleaning the Scanner Window and Screen Clean the scanner window and screen as often as needed for the environment in which you are using the computer. To clean the window and screen, use a solution of ammonia and water. Mixing of ammonia and water should be done in a well ventilated area. There are no user-serviceable parts inside the CK32 I-Safe or in the battery. Opening the unit outside of an Intermec approved service facility will void the I-Safe certification. To clean the scanner window and computer screen 1 Press the Power button to turn off the CK32 I-Safe. 2 Dip a clean towel or rag in the ammonia solution and wring out the excess. Wipe off the scanner window and screen. Do not allow any abrasive material to touch these surfaces. 3 Wipe dry. Cleaning the Handle and Computer The exterior of the computer and the handle should be cleaned with a mild solution of soap and water. Other cleaners may affect the ESD dissipation characteristics of the handle and CK32 I-Safe body. Mild soap refers to soaps you use on your hands and/or body that don't contain any abrasive media or filler. The soap should not contain a large amount of artificial fragrance or any of the following: witch hazel, aloe vera, vegetable and herbal oils such as evening primrose oil, olive oil, or coconut oil, or chamomile, lavender, rosemary or peppermint. Do not use products labeled as detergents. Examples of mild soaps are: • Ivory Snow liquid or powder • Ivory bar soap • Jergens mild soap (bar) • Woolite (an exception to hand/body soaps) 112 CK32 I-Safe Handheld Computer User’s Manual Chapter 5— Troubleshooting and Maintenance Add just enough soap to a quantity of water to start and create sudsing (using agitation while adding), but no more; you can't go wrong with this solution. Keep in mind that the water should just be warm; hot water can have adverse affects on some plastics. • Ammonia is not compatible with polycarbonates, a major component in the CK32 I-Safe housing; it is NOT recommended as a cleaner. • Plastic cleaners like 3M Plastic Cleaner, Plexus®, Meguiar’s® PlastX, All Kleer Plastic Cleaner & Polish and the like all have polishes (micro-abrasives) and waxes that make them unsuitable for cleaning the handle and computer. • Plastic protectants like Armor All® or Son of a Gun® are for protecting plastic from UV rays. They clean to some degree, but can leave the product slippery. Use at your own risk. To clean the handle and computer 1 Unscrew the handle and remove it from the CK32 I-Safe. 2 Clean the surface of the magnet with a damp cloth. 3 Use adhesive tape to remove any metal debris from the surface of the magnet in the handle. 4 Clean the computer and handle. 5 Reattach the handle. CK32 I-Safe Handheld Computer User’s Manual 113 Chapter 5— Troubleshooting and Maintenance 114 CK32 I-Safe Handheld Computer User’s Manual A Specifications CK32 I-Safe Handheld Computer User’s Manual 115 Appendix A — Specifications Physical and Environmental Specifications Use this section to locate technical information about the CK32 I-Safe and its available features and options. Physical Dimensions Length: 24.6 cm (9.41 in) Width: 8.89 cm (3.5 in) Thickness: 7.62 cm (3.0 in) Weight CK32 I-Safe Weight (without battery): 893.59 g (31.52 oz) Battery weight: 194.48 g (6.86 oz) Handle weight: 132.96 g (4.69 oz) Power Specifications Operating: Rechargeable 2400 mA lithium-ion battery Backup: Super capacitor supplies 10 minutes bridge time while replacing the main battery Electrical Specifications Electrical rating: x 7.4 to 12; 500 mA peak Temperature and Humidity Specifications Operating temperature: -20°C to 50°C (-4°F to 122°F) Operating humidity: 5 to 90% non-condensing Storage temperature: -20°C to 60°C with battery 70°C without (-4°F to 140°F with battery 158°F without) Storage humidity: 0 to 95% relative humidity, non-condensing LCD Touch Screen Specifications • 240 x 320 QVGA • 8.89 cm (3.5 in) diagonal square active area • LED backlight with high and low settings • No ambient light sensor 116 CK32 I-Safe Handheld Computer User’s Manual Chapter A — Specifications Keypad Options • 42-key large numeric and function keypad, available with programmable, 3270 TE/5250 TE, and VT/ANSI TE overlays • 56-key full alphanumeric keypad, available with programmable, 3270 TE/5250 TE, and VT/ANSI TE overlays Bar Code Symbologies The CK32 I-Safe supports these bar code symbologies: • • • • • • • • • • • Codabar Codablock A Codablock F Code 11 Code 2 of 5 Code 39 Code 93 Code 128 EAN.UCC Composite Interleaved 2 of 5 Matrix 2 of 5 CK32 I-Safe Handheld Computer User’s Manual Micro PDF417 MSI PDF417 Plessey RSS 14 RSS Limited RSS Expanded Telepen TLC 39 UPC/EAN 117 Appendix A — Specifications Linear Imager Reading Distances Minimum reading distances are measured in the dark (0 lux). Minimum Reading Distances With 0.655 cm (0.258 in) Setback Bar Code Symbology Contents Code 39 RESO 0.100 MM R 0.125 MM 0.25 0.5 R1MM UPC/EAN 120010010100 PDF417 10 mils 15 mils 118 Density Minimum Distance Maximum Distance 0.1 mm (4 mils) 0.125 mm (5 mils) 0.25 mm (10 mils) 0.5 mm (20 mils) 1 mm (40 mils) 0.33 mm (13 mils) 0.254 mm (10 mils) 0.381 mm (15 mils) 10.27 cm (4.04 in) 9.25 cm (3.64 in) 5.44 cm (2.14 in) 3.41 cm (1.34 in) 6.96 cm (2.74 in) 4.42 cm (1.74 in) 9.25 cm (3.64 in) 7.22 cm (2.84 in) 13.31 cm (5.24 in) 16.36 cm (6.44 in) 23.22 cm (9.14 in) 30.33 cm (11.94 in) 39.22 cm (15.44 in) 25.25 cm (9.94 in) 16.10 cm (6.34 in) 18.39 cm (7.24 in) CK32 I-Safe Handheld Computer User’s Manual Chapter A — Specifications in 0" 2" 4" 6" 8" 10" 12" 14" 16" 18" 20" 10" 25 8" 20 100% contrast UPC/ EAN 6" 15 4" 10 2" 0" 2" 4" 10 0.125 mm/ 5 mil 0.25 mm/10 mil 6" 15 0.5 mm/20 mil 8" 20 1 mm/40 mil 25 10" 10 15 20 25 30 35 40 45 50 cm Linear Imager Minimum Reading Distances: This graphic does not include the 0.665 cm (0.258 in) setback for the CK32 I-Safe. CK32 I-Safe Handheld Computer User’s Manual 119 Appendix A — Specifications Minimum Reading Distances With 1.087 cm (0.428 in) Setback Symbology Density Minimum Distance Maximum Distance Code 39 0.125 mm (5 mils) 0.25 mm (10 mils) 0.5 mm (20 mils) 1 mm (40 mils) 1.3 mm (51 mils) 8.564 cm (3.272 in) 5.770 cm (2.272 in) 7.802 cm (3.072 in) 8.818 cm (3.472 in) Depends on the symbology length and scan angle 17.962 cm (7.072 in) 37.774 cm (14.872 in) 78.922 cm (31.072 in) 130.992 cm (51.572 in) 148.772 cm (58.572 in) UPC/EAN 0.33 mm (13 mils) 5.516 cm (2.172 in) 46.918 cm (18.472 in) Typing Characters Not Printed on the Keypads hidden key sequences to access characters not printed on the keypad overlay. Use the following table to understand how to access these hidden characters on the keypads. Typing Hidden Characters on the Keypad Press This Key Sequence on One of the Keypads: 120 To Type: 42-Key 56-Key “ Not hidden C and then F9 Not hidden C and then F6 C and then F7 C and then F11 C and then F12 C and then F3 C and then F4 C and then F8 Not hidden C and then F10 C and then Alpha C and then Right Enter C and then 6 C and then G C and then I C and then K C and then L C and then N C and then O C and then P C and then Q C and then R C and then S C and then T Not hidden Not hidden CK32 I-Safe Handheld Computer User’s Manual Chapter A — Specifications Typing Hidden Characters on the International Keypads To Type: Press This Key Sequence on One of the Keypads: 42-Key 56-Key Not hidden B and then a B and then b B and then _ B and then ` C and then 9 C and then Tab C and then Right Enter C and then 6 C and then 9 C and then 0 Not hidden Not hidden Not hidden Not hidden Not hidden Typing Hidden Characters on the 3270/5250 TE Keypads To Type: “ ‘ Press This Key Sequence on One of the Keypads: 42-Key 56-Key Not hidden B and then _ B and then ` C and then Alpha C and then Tab Not applicable Not hidden Not applicable Not applicable B and then a B and then b Not applicable Not applicable Not hidden Not applicable C and then Right Enter C and then 6 Not hidden Not hidden Not hidden Not hidden C and then G C and then I C and then K C and then L C and then N C key and then O C and then P C and then Q C and then R C and then T Not hidden CK32 I-Safe Handheld Computer User’s Manual 121 Appendix A — Specifications Typing Hidden Characters on the VT/ANSI TE Keypads Press This Key Sequence on One of the Keypads: To Type: 42-Key 56-Key « ‘ Not hidden Not applicable Not hidden Not applicable Not applicable B and then c B and then d Not applicable C and then 5 C and then Alpha C and then Tab B and then _ B and then ` C and then Right Enter C and then 6 C and then G C and then I C and then K C and then L C and then N C key and then O C and then P C and then R Not hidden Not hidden Not hidden Not hidden Not hidden Accessories You can use these accessories (sold and ordered separately) with the CK32 I-Safe. To order accessories, contact your local Intermec sales representative. AN1 Communications Adapter (P/N 871-223-xxx) An external adapter used to connect the CK32 I-Safe with wired networks. Note: You must use the AN1 Communtications Adapter for all wired connections to the CK32 I-Safe. AC11 Quad Battery Charger (P/N 852-914-xxx) Four battery charger. Charge rate is limited by I-Safe requirements. Handle (P/N 714-625-xxx) The handle provides a convenient scanning trigger. Hand Strap (P/N 825-183-xxx) I-Safe leather hand strap 122 CK32 I-Safe Handheld Computer User’s Manual Chapter A — Specifications Carrying Strap Kit (P/N 825-186-xxx) I-Safe leather carrying strap AB6 Battery Pack (P/N 318-021-xxx) Battery pack Tethered Stylus (P/N 203-828-xxx) Use the tethered stylus to make sure that you never lose your stylus. Battery Eliminator (P/N 714-619-xxx) The battery eliminator provides AC power to your CK32 I-Safe handheld computer. Power Supply (P/N 851-061-xxx) Power supply for the Communications Adapter and Quad Battery Charger. Screen Protector (P/N 346-065-004) Clear covering designed to protect the CK32 I-Safe screen. CK32 I-Safe Handheld Computer User’s Manual 123 Appendix A — Specifications 124 CK32 I-Safe Handheld Computer User’s Manual I Index CK32 I-Safe Handheld Computer User’s Manual 125 Index Numerics 3270/5250 TE keypads, typing hidden characters, 121 802.11 network protocols, 45 802.11 radio communications checking status, 47 configuring for UDP Plus network, 47 configuring network parameters, 46 ISpyWiFi status, 48 setting up, 45 ActiveSync functions, 32 installing, 32 starting, 33 ActiveSynch using, 32 Advanced Encryption Standard (AES), 58 AES data encryption, 58 application installing using SmartSystems Console, 100 audio feedback, understanding, 16 system, explained, 16 authentication server, defined, 58 bar code symbologies enabling or disabling, 19 bar code symbologies, enabled, 18 bar code, test scan, 20 bar codes, scanning, 18 battery charging and installing, 5 disposal, 4 explosion hazard, 5 maxiimizing life, 6 message, low battery, 7 power settings, 6 status, 6 using, 4 warnings, low battery, 7 beeper volume, 16 126 Bluetooth audio headset, 45 Bluetooth audio device connecting, 45 Bluetooth communication radio, turning on, 40 range, 39 settings, 41 wireless printing, 41 certificates issued by third party certificate authority, 77 loading multiple certificates, 78 with Import Certificates, 77 CJ32 SmartSystems Foundation, configuring with, 37 CK32 802.11 securtity, 59 accessories, 122 battery, 4 certificate, loading, 76 cleaning, 111 configuring security, 56 developing applications, 82 disabling security, 79 features, 3 Funk and Microsoft Security, chosing between, 60 hidden characters, typing, 120 LEAP security, 59 linear imager reading distances, 118 Microsoft security, new connection, 75 operating paramters, configuring, 36 problems configuring security, 106 problems scanning bar codes, 109 problems while operating, 104 resetting, 110 security types, 56 troubleshooting, 104 wireless connectivity, 107 WPA security, 57 cleaning handle and computer, 112 CK32 I-Safe Handheld Computer User’s Manual Index scanner windown and screen, 112 color-coded keys, using, 10, 11 configuring LEAP security, 63 WEP security with Funk security, 64 with Microsoft security, 75 WPA security with Microsoft security, 75 WPA-PSK security with Microsoft security, 76 with Profile Wizard, 67 developing applications AutoCab, 97 AutoCopy, 95 AutoExec, 91 AutoReg, 96 AutoRun, 93 installing applications, 84 Intermec Developer Library, using, 82 launching automatically, 90 RunAutoRun, 90 Trakker Antares, converting from, 83 web-based, 83 drag-and-drop, using SmartSystems Console, 100 EAP, defined, 58 EAP-FAST security configuring with Profile Wizard, 72 Enterprise mode, defined, 58 Ethernet communication status, checking, 39 Ethernet communications setting up, 37 Etnernet communciations Intermec Settings, using, 38 Extensible Authentication Protocol (EAP), defined, 58 Funk securitiy Intermec Settings, configuring with, 60 Funk Security features, 60 CK32 I-Safe Handheld Computer User’s Manual Funk security configuring LEAP security, 63 WEP, 64 profile wizard, 65 select profile, 60, 65 WPA security, configuring, 61 green key, using, 11 IConnect Ethernet, configuring, 39 Import Certificates, 77 Import Root Certificates, 78 Import User Certificates, 78 installing applications using SmartSystems Console, 100 Installing applications ActiveSynch, 85 installing applications SmartSystems Foundation, 85 Wavelink Avalanche, 87 Intermec Developer Library (IDL) required hardware, 82 required software, 82 Intermec Product Support contacting, 103 operating system version, 104 product information, required, 103 Intermec Settings navigating, 37 starting, 36 using, 36 ISpyWiFi graph function, 55 ISpyWiFi tab contents, 50 list function, 55 Ping tab contents, 54 place in Programs group, 48 startinc from iConnect, 49 supplicant logging, 55 Supplicant tab contents, 52 WiFi scan tab contents, 51 127 Index keypad 42-key illustrated, 9 56-key illustrated, 10 terminal emulation, 8 using, 8 using color-coded keys, 11 LEAP security configuring, 63 configuring with Profile Wizard, 71 required equipment, 59 Load certificate active directory, using, 76 third-party CA, 77 manuals Data Collection Browser Client User’s Guide, 3 iBrowse User’s Guide, 3 TE2000 Terminal Emulation Programmer’s Guide, 3 Microsoft security configuring, 73 configuring WEP, 75 configuring WPA, 75 configuring WPA-PSK, 76 Minimum, 120 orange key, using, 11 passphrase setting with Profile Wizard, 67 PEAP security configuring with Profile Wizard, 68 power key, using, 11 Pre-Shared Key mode, defined, 58 Profile Wizard using to configure WPA-PSK security, 67 Profile wizard WEP security, configuring, 66 programs adding or removing, 32 128 PSK mode, defined, 58 resetting CK32 clean boot, 111 preferred method, 110 secondary method, 110 security configuring LEAP, 63 WEP, 64 WEP security with Microsoft, 75 WPA security with Microsoft, 75 WPA-PSK security with Microsoft, 76 with Profile Wizard, 67 WEP overview, 58 SmartSystems Console using to install applications, 100 SmartSystems Foundation server and console, 37 specifications bar code symbologies, supported, 117 electrical specifications, 116 keypad options, 117 LCD, 116 physical dimensions, 116 power specifications, 116 temperature and humidity, 116 weight, 116 Start screen, 14 status lights, explained, 12 stylus, using, 15 System software updates, 100 taskbar illustrated, 14 TCP/IP wireless communication, 46 TCP/IP Network configuring parameters, 46 terminal emulation, typing hidden characters, 121 CK32 I-Safe Handheld Computer User’s Manual Index third party certificate authority, using to issue certificates, 77 TLS security configuring with Profile Wizard, 69 touch screen aligning, 15 touch screen, using, 14 troubleshooting wireless connectivity, 107 TTLS security configuring with Profile Wizard, 70 UDP Plus network wireless communications, 47 Updating the system software, 100 upgrading downloading files, 100 operating system, 101 SSPB, 102 Upgrading the operating system, 100 using green key, 11 orange key, 11 verify scanner operation, 19 volume beeper volume, disable, 17 WEP security configuring with Funk security, 64 with Microsoft security, 75 overview, 58 Windos Mobile introduction, 24 Windows Mobile accessing programs, 26 CK32 I-Safe Handheld Computer User’s Manual block recognizer, using, 29 command bar, 26 companion programs, 24 entering information, 27 File Exporer, using, 30 Internet Explorer, using, 34 keyboard,typing, 28 navigation bar, 26 pop-up menus, 27 screen, writing on, 30 settings, adjusting, 30 support, 25 text, typing, 30 touch screen, 25 transcriber, using, 29 wireless communications troubleshooting, 107 wireless printer device address, entering, 44 wireless printing applet, 42 choosing printer, 44 discover printer, 43 from application, 41 select printer, 42 WPA security configuring with Microsoft security, 75 WPA2 security overview, 58 WPA2-PSK security configuring with Funk security, 62 configuring with Profile Wizard, 67 WPA-PSK security configuring with Microsoft security, 76 configuring with Funk security, 62 configuring with Profile Wizard, 67 129 Index 130 CK32 I-Safe Handheld Computer User’s Manual Worldwide Headquarters 6001 36th Avenue West Everett, Washington 98203 U.S.A. tel 425.348.2600 fax 425.355.9551 www.intermec.com CK32 I-Safe Handheld Computer User’s Manual *935-006-001* P/N 935-006-001
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.5 Linearized : No Page Mode : UseOutlines XMP Toolkit : 3.1-702 Producer : Acrobat Distiller 7.0.5 (Windows) Creator Tool : FrameMaker 7.1 Modify Date : 2007:04:02 14:29:25-07:00 Create Date : 2007:04:02 09:33:46Z Metadata Date : 2007:04:02 14:29:25-07:00 Format : application/pdf Title : ck32um.book Creator : FUlf Document ID : uuid:12c410f9-7111-474e-8da6-41c65efae8b2 Instance ID : uuid:affdfcbd-a6c3-4392-b9d7-4bd3211739ee Page Count : 144 Author : FUlfEXIF Metadata provided by EXIF.tools