Symbol Technologies MC7095 Enterprise Digital Assistant User Manual
Symbol Technologies Inc Enterprise Digital Assistant
Contents
- 1. User manual 1
- 2. User manual 2
- 3. User manual 1 - MC70 regulatory info sheet
- 4. User manual 2 - MC70 Quick Start
- 5. User manual MC70 series
- 6. User manual BT
- 7. User manual Phone
- 8. User manual WLAN
- 9. user manual MC70 series
- 10. user manual BT
- 11. user manual phone
- 12. user manual WLAN
- 13. user manual MC70 series - MC70 Quick Start
User manual WLAN
Wireless Applications Chapter 7 Introduction Chapter 7 Chapter 7 Wireless Applications PR 10 E /2 LI 0/ M 06 IN Wireless Local Area Networks (LANs) allow mobile computers to communicate wirelessly and send captured data to a host device in real time. Before using the EDA on a WLAN, the facility must be set up with the required hardware to run the wireless LAN and the EDA must be configured. Refer to the documentation provided with the access points (APs) for instructions on setting up the hardware. To configure the EDA, a set of wireless applications provide the tools to configure and test the wireless radio in the EDA. The Wireless Application menu on the task tray provides the following wireless applications: • Wireless Status • Wireless Diagnostics • Find WLANs • Manage Profiles • Options • Enable/Disable Radio • Log On/Off. Tap the Signal Strength icon to display the Wireless Applications menu. Figure 7-1 Wireless Applications Menu 7-2 MC70 Integrator Guide Signal Strength Icon The Signal Strength icon in the task tray indicates the EDA’s wireless signal strength as follows: Table 7-1 Wireless Applications Icons, Signal Strength Descriptions Status Action Wireless LAN network is ready to use. Very good signal strength Wireless LAN network is ready to use. Good signal strength Wireless LAN network is ready to use. Excellent signal strength PR 10 E /2 LI 0/ M 06 IN Icon Fair signal strength Wireless LAN network is ready to use. Notify the network administrator that the signal strength is only “Fair”. Poor signal strength Wireless LAN network is ready to use. Performance may not be optimum. Notify the network administrator that the signal strength is “Poor”. Out-of-network range (not associated) No wireless LAN network connection. Notify the network administrator. No wireless LAN network card detected No wireless LAN network card detected or radio disabled. Notify the network administrator. Turning the WLAN Radio On and Off To turn the WLAN radio off tap the Signal Strength icon and select Disable Radio. Figure 7-2 Disable Radio Wireless Applications 7-3 PR 10 E /2 LI 0/ M 06 IN To turn the WLAN radio on tap the Signal Strength icon and select Enable Radio. Figure 7-3 Enable Radio Find WLANs Application Use the Find WLANs application to discover available networks in the vicinity of the user and EDA. To open the Find WLANs application, tap the Signal Strength icon - Find WLANs. The Find WLANs window displays. Figure 7-4 Find WLANs Window NOTE The Find WLANs display is limited to 32 items (ESSIDs or MAC addresses). A combination of up to 32 ESSIDs/APs may be displayed. Manually enter valid ESSIDs not displayed in the Find WLANs window. See Figure 7-5 on page 7-4. The Find WLANs list displays: • WLAN Networks - Available wireless networks with icons that indicate signal strength and encryption type. The signal strength and encryption icons are described in Table 7-2 and Table 7-3. • Network Type - Type of network. • Channel - Channel on which the AP is transmitting. • Signal Strength - The signal strength of the signal from the AP. 7-4 MC70 Integrator Guide Table 7-2 Signal Strength Icon Icon Description Excellent signal Very good signal Fair signal Poor signal Out of range or no signal PR 10 E /2 LI 0/ M 06 IN Table 7-3 Encryption Icon Good signal Icon Description No encryption. WLAN is an infrastructure network. WLAN is an Ad-Hoc network. WLAN access is encrypted and requires a password. Tap-and-hold on a WLAN network to open a pop-up menu which provides two options: Connect and Refresh. Select Refresh to refresh the WLAN list. Select Connect to create a wireless profile from that network. This starts the Profile Editor Wizard which allows you to set the values for the selected network. After editing the profile, the EDA automatically connects to this new profile. Profile Editor Wizard Use the Profile Editor Wizard to create a new profile or edit an existing profile. If editing a profile, the fields reflect the current settings for that profile. If creating a new profile, the known information for that WLAN network appears in the fields. Navigate through the wizard using the Next and Back buttons. Tap X to quit. On the confirmation dialog box, tap No to return to the wizard or tap Yes to quit and return to the Manage Profiles window. See Manage Profiles Application on page 7-21 for instructions on navigating the Profile Editor Wizard. Profile ID In the Profile ID dialog box in the Profile Editor Wizard, enter the profile name and the ESSID. Figure 7-5 Profile ID Dialog Box Wireless Applications 7-5 Table 7-4 Profile ID Fields Field Description The name and (WLAN) identifier of the network connection. Enter a user friendly name for the mobile computer profile used to connect to either an AP or another networked computer. Example: The Public LAN. ESSID The ESSID is the 802.11 extended service set identifier. The ESSID is 32-character (maximum) string identifying the WLAN, and must match the AP ESSID for the EDA to communicate with the AP. Two profiles with the same user friendly name are acceptable but not recommended. PR 10 E /2 LI 0/ M 06 IN NOTE Name Tap Next. The Operating Mode dialog box displays. Operating Mode Use the Operating Mode dialog box to select the operating mode (Infrastructure or Ad-Hoc) and the country location. Figure 7-6 Operating Mode Dialog Box 7-6 MC70 Integrator Guide Table 7-5 Operating Mode Fields Description Operating Mode Select Infrastructure to enable the EDA to transmit and receive data with an AP. Infrastructure is the default mode. Select Ad Hoc to enable the EDA to form its own local network where mobile computers communicate peer-to-peer without APs using a shared ESSID. Country Country determines if the profile is valid for the country of operation. The profile country must match the country in the options page or it must match the acquired country if 802.11d is enabled. Field PR 10 E /2 LI 0/ M 06 IN Single Country Use: When the device is only used in a single country, set every profile country to Allow Any Country. In the Options - Regulatory dialog box (see Figure 7-46 on page 7-35), select the specific country the device is used in, and deselect the Enable 802.11d option. This is the most common and efficient configuration, eliminating the initialization overhead associated with acquiring a country via 802.11d. Multiple Country Use: When the device is used in more than one country, select the Enable 802.11d option in the Options - Regulatory dialog box (see Figure 7-46 on page 7-35). This eliminates the need for reprograming the country (in Options - Regulatory) each time you enter a new country. However, this only works if the infrastructure (i.e., APs) supports 802.11d (some infrastructures do not support 802.11d, including some Cisco APs). When the Enable 802.11d option is selected, the Options - Regulatory - Country setting is not used. For a single profile that can be used in multiple countries, with infrastructure that supports 802.11d (including Symbol infrastructure), set the Profile Country to Allow Any Country. Under Options - Regulatory, select Enable 802.11d. The Options - Regulatory - Country setting is not used. For a single profile that can be used in multiple countries, but with infrastructure that does not support 802.11d, set the profile country to Allow Any Country, and de-select (uncheck) Enable 802.11d. In this case, the Options - Regulatory - Country setting must always be set to the country the device is currently in. This configuration option is the most efficient and may be chosen for use with any infrastructure. However, the Options - Regulatory Country setting must be manually changed when a new country is entered. Note that using a single profile in multiple countries implies that there is a common ESSID to connect to in each country. This is less likely than having unique ESSIDs in each country, this requires unique profiles for each country. For additional efficiency when using multiple profiles that can be used in multiple countries, the country setting for each profile can be set to a specific country. If the current country (found via 802.11d or set by Options - Regulatory - Country when 802.11d is disabled) does not match the country set in a given profile, then that profile is disabled. This can make profile roaming occur faster. For example, if two profiles are created and configured for Japan, and two more profiles are created and configured for USA, then when in Japan only the first two profiles are active, and when in USA only the last two are active. If they had all been configured for Allow Any Country, then all four would always be active, making profile roaming less efficient. Tap Next. If Ad-Hoc mode was selected the Ad-Hoc dialog box displays. If Infrastructure mode was selected the Authentication dialog box displays. See Authentication on page 7-7 for instruction on setting up authentication. Wireless Applications 7-7 Ad-Hoc Use the Ad-Hoc dialog box to select the required information to control Ad-Hoc mode. This dialog box does not appear if you selected Infrastructure mode. To select Ad-Hoc mode: Select a channel number from the Channel drop-down list. The default is Channel 1 (2412 MHz). PR 10 E /2 LI 0/ M 06 IN 1. Figure 7-7 Ad-Hoc Settings Dialog Box 2. Tap Next. The Authentication dialog box displays. Authentication Use the Authentication dialog box to configure authentication. If you selected Ad-Hoc mode, this dialog box is not available and authentication is set to None by default. Select an authentication type from the drop-down list and tap Next. Selecting PEAP or TTLS displays the Tunneled dialog box. Selecting None, EAP TLS, or LEAP displays the Encryption dialog box. See Encryption on page 7-15 for encryption options. Table 7-6 lists the available authentication options. Figure 7-8 Authentication Dialog Box Table 7-6 Authentication Options Authentication Description None Default setting when authentication is not required on the network. EAP TLS Select this option to enable EAP TLS authentication. EAP TLS is an authentication scheme through IEEE 802.1x. It authenticates users and ensures only valid users can connect to the network. It also restricts unauthorized users from accessing transmitted information by using secure authentication certificates. 7-8 MC70 Integrator Guide Table 7-6 Authentication Options (Continued) Authentication Description Select this option to enable PEAP authentication. This method uses a digital certificate to verify and authenticate a user's identity. LEAP Select this option to enable LEAP authentication, which is based on mutual authentication. The AP and the connecting mobile computer require authentication before gaining access to the network. TTLS Select this option to enable TTLS authentication. Tunneled Authentication PEAP PR 10 E /2 LI 0/ M 06 IN Use the Tunneled Authentication dialog box to select the tunneled authentication options. There are different selections available for PEAP or TTLS authentication. Figure 7-9 Tunneled Authentication Dialog Box To select a tunneled authentication type: 1. Select a tunneled authentication type from the drop-down list. See Table 7-7 and Table 7-8. 2. Select the User Certificate check box if a certificate is required. If you selected the TLS tunnel type that requires a user certificate, the check box is already selected. 3. Tap Next. The Installed User Certificates dialog box appears. Table 7-7 lists the PEAP tunneled authentication options. Table 7-7 PEAP Tunneled Authentication Options PEAP Tunneled Authentication Description MS CHAP v2 Microsoft Challenge Handshake Authentication Protocol version 2 (MS CHAP v2) is a password-based, challenge-response, mutual authentication protocol that uses the industry-standard Message Digest 4 (MD4) and Data Encryption Standard (DES) algorithms to encrypt responses. The authenticating server challenges the access client and the access client challenges the authenticating server. If either challenge is not correctly answered, the connection is rejected. MS CHAP v2 was originally designed by Microsoft as a PPP authentication protocol to provide better protection for dial-up and virtual private network (VPN) connections. With Windows XP SP1, Windows XP SP2, Windows Server 2003, and Windows 2000 SP4, MS CHAP v2 is also an EAP type. TLS EAP TLS is used during phase 2 of the authentication process. This method uses a user certificate to authenticate. Wireless Applications 7-9 Table 7-8 lists the TTLS tunneled authentication options. Table 7-8 TTLS Tunneled Authentication Options TTLS Tunneled Authentication Description Challenge Handshake Authentication Protocol (CHAP) is one of the two main authentication protocols used to verify the user name and password for PPP Internet connections. CHAP is more secure than PAP because it performs a three way handshake during the initial link establishment between the home and remote machines. It can also repeat the authentication anytime after the link is established. MS CHAP Microsoft Challenge Handshake Authentication Protocol (MS CHAP) is an implementation of the CHAP protocol that Microsoft created to authenticate remote Windows workstations. MS CHAP is identical to CHAP, except that MS CHAP is based on the encryption and hashing algorithms used by Windows networks, and the MS CHAP response to a challenge is in a format optimized for compatibility with Windows operating systems. PR 10 E /2 LI 0/ M 06 IN CHAP MS CHAP v2 MS CHAP v2 is a password based, challenge response, mutual authentication protocol that uses the industry standard Message Digest 4 (MD4) and Data Encryption Standard (DES) algorithms to encrypt responses. The authenticating server challenges the access client and the access client challenges the authenticating server. If either challenge is not correctly answered, the connection is rejected. MS CHAP v2 was originally designed by Microsoft as a PPP authentication protocol to provide better protection for dial-up and virtual private network (VPN) connections. With Windows XP SP1, Windows XP SP2, Windows Server 2003, and Windows 2000 SP4, MS CHAP v2 is also an EAP type. PAP Password Authentication Protocol (PAP) has two variations: PAP and CHAP PAP. It verifies a user name and password for PPP Internet connections, but it is not as secure as CHAP, since it works only to establish the initial link. PAP is also more vulnerable to attack because it sends authentication packets throughout the network. Nevertheless, PAP is more commonly used than CHAP to log in to a remote host like an Internet service provider. MD5 Message Digest-5 (MD5) is an authentication algorithm developed by RSA. MD5 generates a 128-bit message digest using a 128-bit key, IPSec truncates the message digest to 96 bits. User Certificate Selection If you checked the User Certificate check box on the Tunneled Authentication dialog box or if TLS is the selected authentication type, the Installed User Certificates dialog box displays. Select a certificate from the 7 - 10 MC70 Integrator Guide PR 10 E /2 LI 0/ M 06 IN Figure 7-10 Installed User Certificates Dialog Box drop-down list of currently installed certificates before proceeding. The selected certificate’s name appears in the drop-down list. If the required certificate is not in the list, install it. User Certificate Installation To install a user certificate (EAP TLS only) and a server certificate for EAP TLS and PEAP authentication: 1. Tap Install Certificate. The Credentials dialog box appears. ********* Figure 7-11 Credentials Dialog Box 2. Enter the User:, Pwd: (password), and Server: information in their respective text boxes. 3. Tap Retrieve. A Progress dialog indicates the status of the certificate retrieval. 4. Tap ok to exit. After the installation completes, the Installed User Certs dialog box displays. NOTE To successfully install a user certificate, the EDA must already be connected to a network from which the server is accessible. Server Certificate Selection If you select the Validate Server Certificate check box, a server certificate is required. Select a certificate on the Installed Server Certificates dialog box. An hour glass may appear as the wizard populates the existing certificate list. If the required certificate is not listed, install it: 1. Select a certificate from the drop-down list of currently installed certificates. Wireless Applications 7 - 11 Tap the Install Certificate button. Figure 7-12 Installed Server Certificates Dialog Box 2. PR 10 E /2 LI 0/ M 06 IN A dialog lists the currently loaded certificate files found in the default directory (\Application\FusionApps\Certs) with the default extension. Figure 7-13 Browse Server Certificates Press the ENT key to change the default path or extension (and search a new path). Select a certificate before tapping the Install button. Figure 7-14 Confirmation Dialog Box A confirmation dialog verifies the installation. If the information in this dialog is correct, tap the Yes button, If the information in this dialog is not correct tap the No button. The wizard returns to the Installed Server Certs dialog box. 7 - 12 MC70 Integrator Guide Credential Cache Options If you selected any of the password-based authentication types, you can select different credential caching options. These options specify when the network credential prompts appear: at connection, on each resume, or at a specified time. Entering the credentials directly into the profile permanently caches the credentials. In this case, the EDA does not require user login. If a profile does not contain credentials entered through the configuration editor, you must log in to the EDA before connecting. PR 10 E /2 LI 0/ M 06 IN Caching options only apply on credentials entered through the login dialog box. Figure 7-15 Prompt for Login at Dialog Box If the EDA does not have the credentials, you are prompted to enter a username and password. If the EDA has the credentials (previous entered via a login dialog box), it uses these credentials unless the caching options require the EDA to prompt for new credentials. If you entered the credentials via the profile, the EDA does not prompt for new credentials. Table 7-9 lists the caching options. Table 7-9 Cache Options Description At Connect Select this option to prompt for credentials whenever the WCS tries to connect to a new profile. Deselect this to use the cached credentials to authenticate. If the credentials are not cached, you are prompted to enter credentials. This option only applies when logged in. On Resume Selecting this reauthenticates an authenticated user when a suspend/resume occurs. Once reauthenticated, the user is prompted for credentials. If the user does not enter the same credentials that were entered prior to the suspend/resume within three attempts, the user is disconnected from the network. This option only applies when logged in. At Time Select this option to perform a local verification on an authenticated user at a specified time. The time can be an absolute time or a relative time from the authentication, and should be in at least 5 minute intervals. Once the time has passed, the user is prompted for credentials. If the user does not enter the correct credentials within three attempts, the user is disconnected from the network. This option only applies when logged in. Entering credentials applies these credentials to a particular profile. Logging out clears all cached credentials. Editing a profile clears all cached credentials for that profile. The following authentication types have credential caching: • EAP TLS • PEAP • LEAP • TTLS. Wireless Applications 7 - 13 Figure 7-16 Time Cache Options Dialog Box Selecting the At Time check box displays the TIme Cache Options dialog box. Tap the Interval radio button to check credentials at a set time interval. 2. Enter the value in minutes in the Min box. 3. Tap the At (hh:mm) radio button to check credentials at a set time. 4. Tap Next. The At Time dialog box appears. PR 10 E /2 LI 0/ M 06 IN 1. Figure 7-17 At Time Dialog Box 5. Enter the time using the 24 hour clock format in the (hh:mm) box. 6. Tap > to move the time to the right. Repeat for additional time periods. 7. Tap Next. The User Name dialog box displays. The user name and password can be entered (but is not required) when the profile is created. When a profile authenticates with credentials that were entered in the profile, caching rules do not apply. Caching rules only apply on credentials that are entered through the login dialog box. Figure 7-18 Username Dialog Box 7 - 14 MC70 Integrator Guide Password Figure 7-19 Password Dialog Box Enter a password in the Password field. PR 10 E /2 LI 0/ M 06 IN 1. Use the Password dialog box to enter a password. If EAP/TLS is the selected authentication type, the password is not required and the field is disabled. 2. Select the Advanced ID check box, if advanced identification is required. 3. Tap Next. The Encryption dialog box displays. See Encryption on page 7-15. Advanced Identity Use the Advanced ID dialog box to enter the 802.1X identity to supply to the authenticator. This value can be 63 characters long and is case sensitive. In TTLS and PEAP, it is recommended entering the identity anonymous (rather than a true identity) plus any desired realm (e.g., anonymous@myrealm). A user ID is required before proceeding. NOTE When authenticating with a Microsoft IAS server, do not use advanced identity. Figure 7-20 Advanced Identity Dialog Box Tap Next. The Encryption dialog box displays. Wireless Applications 7 - 15 Encryption Figure 7-21 Encryption Dialog Box PR 10 E /2 LI 0/ M 06 IN Table 7-10 Encryption Options Use the Encryption dialog box to select an encryption type. The drop-down list includes encryption types available for the selected authentication type. See Table 7-11 for these encryption types. Encryption Description Open Select Open (the default) when no data packet encryption is needed over the network. Selecting this option provides no security for data transmitting over the network. 40-Bit WEP Select 40-Bit WEP to use 40-bit key length WEP encryption. WEP keys are manually entered in the edit boxes. Only the required number of edit boxes for a key length is displayed (10 Hex digit value for 40-bit keys). Use the Key Index drop-down list to configure the four WEP keys. The adapter uses the selected key. Note: The default Hex digit keys are visible any time they are used. As a security precaution after setting the key values for the network, the digits are replaced with asterisks * in the encryption key fields. If the associated AP uses an optional passkey, the active adapter WLAN profile must use one as well. The passkey is a plain text representation of the WEP keys displayed in the encryption dialog box. The passkey provides an easy way to enter WEP key data without having to remember the entire 40-bit (10 character) Hex digit string. 128-Bit WEP Select 128-Bit WEP to use 128-bit key length WEP encryption. WEP keys are manually entered in the edit boxes. Only the required number of edit boxes for a key length is displayed (26 Hex digit value for 128-bit keys). Use the Key Index drop-down list to configure the four WEP keys. The adapter uses the selected key. Note: The default Hex digit keys are visible any time they are used. As a security precaution after setting the key values for the network, the digits are replaced with asterisks * in the encryption key fields. If the associated AP uses an optional passkey, the active adapter WLAN profile must use one as well. The passkey is a plain text representation of the WEP keys displayed in the encryption dialog box. The passkey provides an easy way to enter WEP key data without having to remember the entire 128-bit (26 character) Hex digit string. TKIP Select this option to use Wireless Protected Access (WPA) via TKIP. Manually enter the shared keys in the passkey field. Tap Next to display the passkey dialog box. Enter an 8 to 63 character string. 7 - 16 MC70 Integrator Guide Table 7-11 Encryption / Authentication Matrix Encryption Authentication Open WEP TKIP Yes Yes Yes EAP TLS No Yes Yes PEAP No Yes Yes LEAP No Yes Yes TTLS No Yes Yes PR 10 E /2 LI 0/ M 06 IN None Key Entry Page If you select either 40-Bit WEP or 128-Bit WEP the wizard proceeds to the key entry dialog box unless the Use Passkey check box was selected in the Encryption dialog box (see Figure 7-21 on page 7-15). To enter the key information: 1. Enter the 40-bit or 128-bit keys into the fields. 2. Tap Next. 40-Bit WEP Keys Dialog Box 128-Bit WEP Keys Dialog Box Figure 7-22 40-Bit and 128-Bit WEP Keys Dialog Boxes Passkey Dialog When you select None as an authentication and WEP as an encryption, you can choose to enter a passkey by checking the Use PassKey check box. The user is prompted to enter the passkey. For WEP, the Use PassKey checkbox is only available if the authentication is None. When you select None as an authentication and TKIP as an encryption, you must enter a passkey. The user cannot enter a passkey if the encryption is TKIP and the authentication is anything other than None. Figure 7-23 Passkey Dialog Box Wireless Applications 7 - 17 Tap Next. The IP Mode dialog box displays. IP Mode PR 10 E /2 LI 0/ M 06 IN Figure 7-24 IP Config Tab (DHCP) Use the IP Mode dialog box to configure network address parameters: IP address, subnet, gateway, DNS, and WINS. Table 7-12 IP Mode Options Encryption Description DHCP Select Dynamic Host Configuration Protocol (DHCP) from the IP Mode drop-down list to obtain a leased IP address and network configuration information from a remote server. DHCP is the default setting for the EDA profile. When DHCP is selected, the IP address fields are read-only. Static Select Static to manually assign the IP, subnet mask, default gateway, DNS, and WINS addresses the EDA profile uses. Select either DHCP or Static from the drop-down list and tap Next. Selecting Static IP displays the IP Address Entry dialog box. Selecting DHCP displays the Transmit Power dialog box. IP Address Entry Use the IP Address Entry dialog box to enter the IP address and subnet information. Figure 7-25 Static IP Address Entry Dialog Box 7 - 18 MC70 Integrator Guide Table 7-13 Static IP Address Entry Fields Field Description The Internet is a collection of networks with users that communicate with each other. Each communication carries the address of the source and destination networks and the particular machine within the network associated with the user or host computer at each end. This address is called the IP address (Internet Protocol address). Each node on the IP network must be assigned a unique IP address that is made up of a network identifier and a host identifier. Enter the IP address as a dotted-decimal notation with the decimal value of each octet separated by a period, for example, 192.168.7.27. Subnet Mask Most TCP/IP networks use subnets to manage routed IP addresses. Dividing an organization's network into subnets allows it to connect to the Internet with a single shared network address, for example, 255.255.255.0. PR 10 E /2 LI 0/ M 06 IN IP Address Select the Advanced check box, then tap NEXT to display the Advanced Address Entry dialog box. Enter the Gateway, DNS, and WINS address. Tap NEXT without selecting the Advanced check box to display the Transmit Power dialog box. Figure 7-26 Advanced Address Entry Dialog Box The IP information entered in the profile is only used if you selected the Enable IP Mgmt check box in the Options - System Options dialog box (System Options on page 7-36). If you didn’t select this, the IP information in the profile is ignored and the IP information entered in the Microsoft interface applies. Table 7-14 IP Config Advanced Address Entry Fields Field Description G/W The default gateway forwards IP packets to and from a remote destination. DNS The Domain Name System (DNS) is a distributed Internet directory service. DNS translates domain names and IP addresses, and controls Internet email delivery. Most Internet services require DNS to operate properly. If DNS is not configured, Web sites cannot be located and/or email delivery fails. WINS WINS is a Microsoft® Net BIOS name server. WINS eliminates the broadcasts needed to resolve computer names to IP addresses by providing a cache or database of translations. Tap Next. The Transmit Power dialog box displays. Wireless Applications 7 - 19 Transmit Power The Transmit Power drop-down list contains different options for Ad-Hoc and Infrastructure mode. Automatic (i.e., use the current AP settings) and Power Plus (use higher than the current AP settings) are available for Infrastructure mode. PR 10 E /2 LI 0/ M 06 IN Adjusting the radio transmission power level enables the user to expand or confine the transmission area with respect to other wireless devices that could be operating nearby. Reducing coverage in high traffic areas improves transmission quality by reducing the amount of interference in that coverage area. Figure 7-27 Transmit Power Dialog Box (Infrastructure Mode) Table 7-15 Transmit Power Dialog Box (Infrastructure Mode) Field Description Automatic Select Automatic (the default) to use the AP power level. Power Plus Select Power Plus to set the EDA transmission power one level higher than the level set for the AP. Figure 7-28 Transmit Power Dialog Box (Ad-Hoc Mode) Table 7-16 Power Transmit Options (Ad-Hoc Mode) Field Description Full Select Full power for the highest transmission power level. Select Full power when operating in highly reflective environments and areas where other devices could be operating nearby, or when attempting to communicate with devices at the outer edge of a coverage area. 30 mW Select 30 mW to set the transmit power level to 30 mW. 7 - 20 MC70 Integrator Guide Table 7-16 Power Transmit Options (Ad-Hoc Mode) (Continued) Field Description Select 15 mW to set the transmit power level to 15 mW. 5 mW Select 5 mW to set the transmit power level to 5 mW. 1 mW Select 1 mW for the lowest transmission power level. Use this level when communicating with other devices in very close proximity, or in instances where you expect little or no radio interference from other devices. Tap Next to display the Battery Usage dialog box. Battery Usage 15 mW PR 10 E /2 LI 0/ M 06 IN Use the Battery Usage dialog box to select power consumption of the wireless LAN. There are three settings available: CAM, Fast Power Save, and MAX Power Save. Battery usage cannot be configured in Ad-Hoc profiles. Figure 7-29 Battery Usage Dialog Box NOTE Power consumption is also related to the transmit power settings. Table 7-17 Battery Usage Options Field Description CAM Continuous Aware Mode (CAM) provides the best network performance, but yields the shortest battery life. Fast Power Save Fast Power Save (the default) performs in the middle of CAM and MAX Power Save with respect to network performance and battery life. MAX Power Save Max Power Save yields the longest battery life while potentially reducing network performance. In networks with minimal latency, Max Power Save performs as well as Fast Power Save, but with increased battery conservation. Wireless Applications 7 - 21 Manage Profiles Application PR 10 E /2 LI 0/ M 06 IN The Manage Profiles window provides a list of user-configured wireless profiles. Define up to 32 profiles at any one time. To open the Manage Profiles window, tap the Signal Strength icon - Manage Profiles. Figure 7-30 Manage Profiles Window Icons next to each profile identify the profile’s current state. Table 7-18 Profile Icons Icon No Icon Description Profile is not selected, but enabled. Profile is disabled. Profile is cancelled. A cancelled profile is disabled until a connect or login function is performed through the configuration editor. Profile is in use and describes an infrastructure profile not using encryption. Profile is in use and describes an infrastructure profile using encryption. Profile is in use and describes an ad-hoc profile not using encryption. Profile is in use and describes an ad-hoc profile using encryption. Profile is not valid in the device current operating regulatory domain. The profiles are listed in priority order for use by the automatic roaming feature. Change the order by moving profiles up or down. To edit existing profiles, tap and hold one in the list and select an option from the menu to connect, edit, disable (enable), or delete the profile. (Note that the Disable menu item changes to Enable if the profile is already disabled.) PR 10 E /2 LI 0/ M 06 IN Figure 7-31 Manage Profiles Context Menu 7 - 22 MC70 Integrator Guide Changing Profiles A completed profile is a set of configuration settings that can be used in different locations to connect to a wireless network. Create different profiles to have pre-defined operating parameters available for use in various network environments. When the WLAN Profiles window displays, existing profiles appear in the list. Figure 7-32 Manage Profiles Tap and hold a profile and select Connect from the pop-up menu to set this as the active profile. Once selected, the EDA uses the authentication, encryption, ESSID, IP Config, and power consumption settings configured for that profile. Editing a Profile Tap and hold a profile and select Edit from the pop-up menu to display the Profile Wizard where you can set the ESSID and operating mode for the profile. Use the Profile Wizard to edit the profile power consumption and security parameters. See Profile Editor Wizard on page 7-4. Wireless Applications 7 - 23 Creating a New Profile PR 10 E /2 LI 0/ M 06 IN To create new profiles from the Manage Profiles window, tap-and-hold anywhere in this window. Figure 7-33 Manage Profiles - Add Select Add to display the Profile Wizard wherein you can set the profile name and ESSID. Set security, network address information, and power consumption level for the new profile. Deleting a Profile To delete a profile from the list, tap and hold and select Delete from the pop-up menu. A confirmation dialog box appears. Ordering Profiles Tap and hold a profile from the list and select Move Up or Move Down to order the profile. If the current profile association is lost, the EDA attempts to associate with the first profile in the list, then the next, until it achieves a new association. NOTE Profile Roaming must be enabled. 7 - 24 MC70 Integrator Guide Export a Profile PR 10 E /2 LI 0/ M 06 IN To export a profile to a registry file, tap and hold a profile from the list and select Export from the pop-up menu. The Save As dialog box displays with the Application folder and a default name of WCS_PROFILE{profile GUID}.reg (Globally Unique Identifier). Figure 7-34 Save As Dialog Box If required, change the name in the Name field and tap Save. A confirmation dialog box appears after the export completes. Wireless Status Application To open the Wireless Status window, tap the Signal Strength icon - Wireless Status. The Wireless Status window displays information about the wireless connection. Figure 7-35 Wireless Status Window The Wireless Status window contains the following options. Tap the option to display the option window. • Signal Strength - provides information about the connection status of the current wireless profile. • Current Profile - displays basic information about the current profile and connection settings. • IPv4 Status - displays the current IP address, subnet, and other IP related information assigned to the EDA. Wireless Applications 7 - 25 • Wireless Log - displays a log of important recent activity, such as authentication, association, and DHCP renewal completion, in time order. • Versions - displays software, firmware, and hardware version numbers. • Quit - exits the Wireless Status window. Option windows contain a back button to return to the main Wireless Status window. Signal Strength Window The Signal Strength window provides information about the connection status of the current wireless profile including signal quality, missed beacons, and transmit retry statistics. The BSSID address (shown as AP MAC Address) displays the AP currently associated with the connection. In Ad-Hoc mode, the AP MAC Address shows the BSSID of the Ad-Hoc network. Information in this window updates every 2 seconds. PR 10 E /2 LI 0/ M 06 IN To open the Signal Status window, tap Signal Strength in the Wireless Status window. Figure 7-36 Signal Strength Window After viewing the Signal Strength window, tap the back button to return to the Wireless Status window. Table 7-19 Signal Strength Status Field Signal Description Displays the Relative Signal Strength Indicator (RSSI) of the signal transmitted between the AP and EDA. As long as the Signal Quality icon is green the AP association is not jeopardized. If the icon is red (poor signal), an association with a different AP could be warranted to improve the signal. The signal strength icon changes depending on the signal strength. Excellent Signal Very Good Signal Good Signal Fair Signal Poor Signal Out of Range (no signal) The radio card is off or there is a problem communicating with the radio card. Status Indicates if the EDA is associated with the AP. Signal Quality Displays a text format of the Signal icon. 7 - 26 MC70 Integrator Guide Table 7-19 Signal Strength Status (Continued) Field Description Displays a percentage of the number of data packets the EDA retransmits. The fewer transmit retries, the more efficient the wireless network is. Missed Beacons Displays a percentage of the amount of beacons the EDA missed. The fewer transmit retries, the more efficient the wireless network is. Beacons are uniform system packets broadcast by the AP to keep the network synchronized. Signal Level The AP signal level in decibels per milliwatt (dBm). Noise Level The background interference (noise) level in decibels per milliwatt (dBm). SNR The access point/EDA Signal to Noise Ratio (SNR) of signal strength to noise (interference) in decibels per milliwatt (dBm). Association Count Displays the number of APs the EDA connects to while roaming. AP MAC Address Displays the MAC address of the AP to which the EDA is connected. Transmit Rate Displays the current rate of the data transmission. PR 10 E /2 LI 0/ M 06 IN Tx Retries Current Profile Window The Current Profile window displays basic information about the current profile and connection settings. This window updates every two seconds. To open the Current Profile window, tap Current Profile in the Wireless Status window. Figure 7-37 Current Profile Window Wireless Applications 7 - 27 Table 7-20 Current Profile Window Field Description Displays the current profile name the EDA uses to communicate with the AP. ESSID Displays the current profile ESSID name. Mode Displays the current profile mode, either Infrastructure or Ad-Hoc. Authentication Displays the current profile’s authentication type. Encryption Displays the current profile’s encryption type. Channel Displays the current profile’s channel setting. PR 10 E /2 LI 0/ M 06 IN Profile Name Country Displays the current profile’s country setting. Transmit Power Displays the radio transmission power level. IPv4 Status Window The IPv4 Status window displays the current IP address, subnet, and other IP related information assigned to the EDA. It also allows renewing the address if the profile is using DHCP to obtain the IP information. Tap Renew to initiate a full DHCP discover. The IPv4 Status window updates automatically when the IP address changes. To open the IPv4 Status window, tap IPv4 Status in the Wireless Status window. Figure 7-38 IPv4 Status Window 7 - 28 MC70 Integrator Guide Table 7-21 IPv4 Status Fields Field Description Displays the IP type for the current profile: DHCP or Static. If the IP type is DHCP, leased IP address and network address data appear for the EDA. If the IP type is Static, the values displayed were input manually in the IP Config tab on page 7-17. IP Address Displays the EDA’s IP address. The Internet is a collection of networks with users that communicate with each other. Each communication carries the address of the source and destination networks and the particular machine within the network associated with the user or host computer at each end. This address is called the IP address. Each node on the IP network must be assigned a unique IP address that is made up of a network identifier and a host identifier. The IP address as a dotted-decimal notation with the decimal value of each octet separated by a period, for example, 192.168.7.27. PR 10 E /2 LI 0/ M 06 IN IP Type Subnet Displays the subnet address. Most TCP/IP networks use subnets to manage routed IP addresses. Dividing an organization's network into subnets allows it to connect to the Internet with a single shared network address, for example, 255.255.255.0. Gateway Displays the gateway address. A gateway forwards IP packets to and from a remote destination. DCHP Server The Domain Name System (DNS) is a distributed Internet directory service. DNS translates domain names and IP addresses, and controls Internet e-mail delivery. Most Internet services require DNS to operate properly. If DNS is not configured, Web sites cannot be located or e-mail delivery fails. Lease Obtained Displays the date that the IP address was obtained. Lease Expires Displays the date that the IP address expires and a new IP address is requested. DNS Displays the IP address of the DNS server. WINS WINS is a Microsoft Net BIOS name server. WINS eliminates the broadcasts needed to resolve computer names to IP addresses by providing a cache or database of translations. MAC An IEEE 48-bit address is assigned to the EDA at the factory to uniquely identify the adapter at the physical layer. Host Name Displays the name of the EDA. Wireless Applications 7 - 29 Wireless Log Window The Wireless Log window displays a log of recent activity, such as authentication, association, and DHCP renewal completion, in time order. Save the log to a file or clear the log (within this instance of the application only). The auto-scroll feature automatically scrolls down when new items are added to the log. PR 10 E /2 LI 0/ M 06 IN To open the Wireless Log window, tap Wireless Log in the Wireless Status window. The Wireless Log window displays. Figure 7-39 Wireless Log Window Saving a Log To save a Wireless Log: 1. Tap the Save button. The Save As dialog box displays. 2. Navigate to the desired folder. 3. In the Name filed, enter a file name and then tap OK. A text file is saved in the selected folder. Clearing the Log To clear the log, tap Clear. Versions Window The Versions window displays software, firmware, and hardware version numbers. This window only updates when it is displayed. There is no need to update constantly. The content of the window is determined at runtime, along with the actual hardware and software to display in the list. Executable paths of the software components on the list are defined in registry, so that the application can retrieve version information from the executable. “File not found” appears if the executable cannot be found at the specified path. 7 - 30 MC70 Integrator Guide PR 10 E /2 LI 0/ M 06 IN To open the Versions window, tap Versions in the Wireless Status window. Figure 7-40 Versions Window The window displays software version numbers for the following: • Configuration Editor • Fusion Build • LoginService • Photon1.0 • WCDiag • WCLaunch • WCSAPI • WCSRV • WCStatus. Wireless Applications 7 - 31 Wireless Diagnostics Application PR 10 E /2 LI 0/ M 06 IN The Wireless Diagnostics application window provides links to perform ICMP Ping, Trace Routing, and Known APs. To open the Wireless Diagnostics window, tap the Signal Strength icon - Wireless Diagnostics. Figure 7-41 Wireless Diagnostics Window The Wireless Diagnostics window contains the following options. Tap the option to display the option window. • ICMP Ping - tests the wireless network connection. • Trace Route - tests a connection at the network layer between the EDA and any place on the network. • Known APs - displays the APs in range using the same ESSID as the EDA. • Quit - Exits the Wireless Diagnostics window. Option windows contain a back button to return to the Wireless Diagnostics window. ICMP Ping Window The ICMP Ping window allows testing a connection at the network layer (part of the IP protocol) between the EDA and an AP. Ping tests only stop when you tap the Stop Test button, close the Wireless Diagnostics application, or if the EDA switches between infrastructure and ad-hoc modes. 7 - 32 MC70 Integrator Guide PR 10 E /2 LI 0/ M 06 IN To open the ICMP Ping window, tap the ICMP Ping in the Wireless Diagnostics window. Figure 7-42 ICMP Ping Window To perform an ICMP ping: 1. In the IP field, enter an IP address or select an IP address from the drop-down list. 2. From the Size drop-down list, select a size value. 3. Tap Start Test. The ICMP Ping test starts. Information of the ping test displays in the appropriate fields. Trace Route Window Trace Route traces a packet from a computer to a host, showing how many hops the packet requires to reach the host and how long each hop takes. The Trace Route utility identifies where the longest delays occur. The Trace Route window allows testing a connection at the network layer (part of the IP protocol) between the EDA and any place on the network. To open the Trace Route window, tap Trace Route in the Wireless Diagnostics window. Figure 7-43 Trace Route Window Enter an IP address or a DNS Name in the IP combo box, and tap Start Test. The IP combo box should match the information shown in the ICMP Ping window’s IP combo box. When starting a test, the trace route attempts Wireless Applications 7 - 33 to find all routers between the EDA and the destination. The Round Trip Time (RTT) between the EDA and each router appears, along with the total test time. The total test time may be longer than all RTTs added together because it does not only include time on the network. Known APs Window PR 10 E /2 LI 0/ M 06 IN The Known APs window displays the APs in range using the same ESSID as the EDA. This window is only available in Infrastructure mode. To open the Known APs window, tap Known APs in the Wireless Diagnostics window. Figure 7-44 Known APs Window See Table 7-22 for the definitions of the icons next to the AP. Table 7-22 Current Profile Window Icon Description The AP is the associated access point, and is set to mandatory. The AP is the associated access point, but is not set to mandatory. The EDA is not associated to this AP, but the AP is set as mandatory. The EDA is not associated to this AP, and AP is not set as mandatory. Tap and hold on an AP to display a pop-up menu with the following options: Set Mandatory and Set Roaming. Select Set Mandatory to prohibit the EDA from associating with a different AP. The letter M displays on top of the icon. The EDA connects to the selected AP and never roams until: • You select Set Roaming • The EDA roams to a new profile • The EDA suspends • The EDA resets (warm or cold). Select Set Roaming to allow the EDA to roam to any AP with a better signal. These settings are temporary and never saved to the registry. Tap Refresh to update the list of the APs with the same ESSID. The highest signal strength value is 32. 7 - 34 MC70 Integrator Guide Options Use the wireless Option dialog box to select one of the following operation options from the drop-down list: Operating Mode Filtering • Regulatory • Band Selection • System Options • Change Password • Export. • PR 10 E /2 LI 0/ M 06 IN Operating Mode Filtering The Operating Mode Filtering options cause the Find WLANs application to filter the available networks found. Figure 7-45 OP Mode Filtering Dialog Box The AP Networks and Ad-Hoc Networks check boxes are selected by default. Table 7-23 OP Mode Filtering Options Field Description AP Networks Select the AP Networks check box to display available AP networks and their signal strength within the Available WLAN Networks (see Find WLANs Application on page 7-3). These are the APs available to the EDA profile for association. If this option was previously disabled, refresh the Available WLAN Networks window to display the AP networks available to the EDA. AD-Hoc Networks Select the Ad-Hoc Networks check box to display available peer (adapter) networks and their signal strength within the Available WLAN Networks. These are peer networks available to the EDA profile for association. If this option was previously disabled, refresh the Available WLAN Networks window to display the Ad Hoc networks available to the EDA. Tap Save to save the settings or tap X to discard any changes. Wireless Applications 7 - 35 Regulatory Options Figure 7-46 Regulatory Options Dialog Box PR 10 E /2 LI 0/ M 06 IN Table 7-24 Regulatory Options Use the Regulatory settings to configure the country the EDA is in. Due to regulatory requirements (within a country) a EDA is only allowed to use certain channels. Field Description Settings Select the country from the drop-down list. To connect to a profile, the profile country must match this setting, or the AP country setting if you selected the Enable 802.11d check box. Enable 802.11d The WLAN adapter attempts to retrieve the country from APs. Profiles which use Infrastructure mode can only connect if the country set is the same as the AP country settings or if the profile country setting is Allow Any Country. All APs must be configured to transmit the country information. Band Selection The Band Selection settings identify the frequency bands to scan when finding WLANs. These values refer to the 802.11 standard networks. Figure 7-47 Band Selection Dialog Box Table 7-25 Band Selection Options Field Description 5GHz Band The Find WLANs application list includes all networks found in the 5 GHz band (802.11a). 2.4GHz Band The Find WLANs application list includes all networks found in the 2.4 GHz band (802.11b and 802.11g). Tap Save to save the settings or tap X to discard any changes. 7 - 36 MC70 Integrator Guide System Options Figure 7-48 System Options Dialog Box PR 10 E /2 LI 0/ M 06 IN Table 7-26 System Options Use System Options to set miscellaneous system setting. Field Description Profile Roaming Configures the EDA to roam to the next available WLAN profile when it moves out of range of the current WLAN profile. Enable IP Mgmt Enables the Wireless Companion Services to handle IP address management. The Wireless Companion Service configures the IP based on what is configured in the network profile. Deselect this to manually configure the IP in the standard Windows IP window. Enabled by default. Auto Time Config Enables automatic update of the system time. Network association updates the device time based on the time set in the AP. This proprietary feature is only supported with Symbol infrastructure. Enabled by default. Change Password Use Change Password to require a password before editing a profile. This allows pre-configuring profiles and prevents users from changing the network settings. The user can use this feature to protect settings from a guest user. By default, the password is not set. Figure 7-49 Change Password Window To create a password for the first time, leave the Current: text box empty and enter the new password in the New: and Confirm: text boxes. Tap Save. To change an existing password, enter the current password in the Current: text box and enter the new password in the New: and Confirm: text boxes. Tap Save. Wireless Applications 7 - 37 To delete the password, enter the current password in the Current: text box and leave the New: and Confirm: text boxes empty. Tap Save. NOTE Passwords are case sensitive and can not exceed 10 characters. Export PR 10 E /2 LI 0/ M 06 IN Use Export to export all profiles to a registry file, and to export the options to a registry file. Figure 7-50 Options - Export Dialog Box To export options: 1. Tap Export Options. The Save As dialog box displays. Figure 7-51 Export Options Save As Dialog Box 2. Enter a filename in the Name: field. The default filename is WCS_OPTIONS.REG. 3. Tap Save. 7 - 38 MC70 Integrator Guide To export all profiles: Tap Export All Profiles. The Save As dialog box displays. PR 10 E /2 LI 0/ M 06 IN 1. Figure 7-52 Export All Profiles Save As Dialog Box 2. Enter a filename in the Name: field. The default filename is WCS_PROFILES.REG. 3. In the Folder: drop-down list, select the desired folder. 4. Tap Save. Selecting Export All Profiles saves the current profile. This information is used to determine which profile to connect with after a warm boot or cold boot. Cold Boot Persistence Export options and profiles to provide cold boot persistence. Save the exported registry files in the Application folder to use them on a cold boot and restore previous profile and option settings. Currently, only server certificates can be saved for cold boot persistence. To save server certificates for cold boot persistence, save the certificate files in the folder Application\Certs to install the certificates automatically on a cold boot. NOTE User certificates cannot be saved for cold boot persistence at this time. Wireless Applications 7 - 39 Registry Settings Use a registry key to modify some of the parameters. The registry path is: HKLM\SOFTWARE\Symbol Technologies, Inc.\Configuration Editor Table 7-27 Registry Parameter Settings Type Default REG_SZ \\Windows EncryptionMask REG_DWORD 0x0000001F The default directory to find certificates. Defines the supported encryption types. This is a bitwise mask with each bit corresponding to an encryption type. 1 = Type is supported 0 = Type is not supported PR 10 E /2 LI 0/ M 06 IN CertificateDirectory Description Key Bit Number Encryption Type None 40-Bit WEP 128-Bit WEP TKIP MenuShortCut REG_SZ Alt-M Describes the key combination to use for menu selection. Tap-and-hold or use a key sequence to display menus. This value can be a system key sequence (i.e., preceded with ALT) or a single key which triggers a pop-up menu when the appropriate dialog is visible. RefreshTime REG_DWORD 4000 This registry key defines the number of milliseconds between refreshes of the Manage Profiles window. Log On/Off Application When the user launches the Log On/Off application, the EDA may be in two states; the user may be logged onto the EDA by already entering credentials through the login box, or there are no user logged on. Each of these states have a separate set of use cases and a different look to the dialog box. User Already Logged In If already logged into the EDA, the user can launch the login dialog box for the following reasons: • Connect to and re-enable a cancelled profile. To do this: - Launch the password dialog. - Select the cancelled profile from the profile list. - Login to the profile. NOTE Re-enable cancelled profiles using the Profile Editor Wizard and choosing to connect to the cancelled profile. Cancelled profiles are also re-enabled when a new user logs on. 7 - 40 MC70 Integrator Guide • Log off the EDA to prevent another user from accessing the current users network privileges. • Switch EDA users to quickly logoff the EDA and allow another user to log into the EDA. No User Logged In If no user is logged into the EDA, launch the login dialog box and log in to access user profiles. The Login dialog box varies if it is: Launched by WCS, because the service is connecting to a new profile that needs credentials. • Launched by WCS, because the service is trying to verify the credentials due to credential caching rules. • Launched by a user, when a user is logged in. • Launched by a user, when no user is logged in. PR 10 E /2 LI 0/ M 06 IN • Device Username Field The device username is a high level username used to link different network credentials to the same person as explained above. The Device Username field is only writable when there is no user logged on. Otherwise it is static text. The Device Username has a maximum length defined in the WCSAPI. Table 7-28 Log On/Off Options Field Description Wireless Profile Field When launching the login application, the Wireless Profile field has available all the wireless profiles that require credentials. This includes profiles that use EAP TLS, PEAP, LEAP, and EAP-TTLS. Profile Status Icon The profile status icon (next to the profile name) shows one of the following states: The selected profile is cancelled. The selected profile is enabled but is not the current profile. The profile is the current profile (always the case for WCS Launched). Network Username and Password Fields The Network Username and Network Password fields are used as credentials for the profile selected in the Wireless Profile field. Currently these fields are limited to 159 characters. Mask Password Checkbox The Mask Password checkbox determines whether the password field is masked (i.e., displays only the '*' character) or unmasked (i.e., displays the entered text). Check the box to unmask the password. Uncheck the box to mask the password (the default). Status Field The status field displays status that is important to the login dialog. If the user opens the dialog and needs to prompt for credentials for a particular profile at this time, it can use the status field to let the user know that the network is held up by the password dialog being open. Tapping OK sends the credentials though WCS API. If there are no credentials entered, a dialog box displays informing the user which field was not entered. The Log Off button only displays when a user is already logged on. When the Log Off button is tapped, the user is prompted with three options: Log Off, Switch Users, and Cancel. Switching users logs off the current user and re-initialize the login dialog box to be displayed for when there is no user logged on. Logging off logs Wireless Applications 7 - 41 off the current user and close the login dialog box. Tapping Cancel closes the Log Off dialog box and the Login dialog box displays. When the user is logged off, the EDA only roams to profiles that do not require credentials or to profiles that were created with the credentials entered into the profile The Cancel button closes the dialog without logging into the network. If the login dialog was launched by the wCS and not by the user, tapping Cancel first causes a message box to display a warning that the cancel disables the current profile. If the user still chooses to cancel the login at this point, the profile is cancelled. PR 10 E /2 LI 0/ M 06 IN Once a profile is cancelled, the profile is suppressed until a user actively re-enables it or a new user logs onto the EDA. PR 10 E /2 LI 0/ M 06 IN 7 - 42 MC70 Integrator Guide
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.6 Linearized : No XMP Toolkit : 3.1-702 Modify Date : 2006:10:20 19:01:08+01:00 Create Date : 2006:10:20 19:00:45+01:00 Metadata Date : 2006:10:20 19:01:08+01:00 Creator Tool : FrameMaker 7.0 Format : application/pdf Title : untitled Document ID : uuid:168bd80b-9872-448f-b3ae-3b3d6decd9c6 Instance ID : uuid:3a1a4d04-904c-4ec0-ac2a-6e1250f6b756 Producer : Acrobat Distiller 7.0.5 (Windows) Page Count : 42 Creator : FrameMaker 7.0EXIF Metadata provided by EXIF.tools