Intermec CK60 Manual do Utilizador Página 109

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
Vista de página 108
Chapter 5 — Network Support
CK60 Mobile Computer with Windows CE User’s Manual 95
The CK60 provides three types of security for your wireless network: Wi-Fi
Protected Access 2 (WPA2/802.11i), WPA, and WEP. 802.1x should be
referred to as an authentication method used for WPA and WPA2. Another
authentication method for WPA and WPA2 would be the Pre-Shared Key
(PSK).
Choosing Between Microsoft and Funk Security
Before you can implement a security solution on the CK60, you need to
choose between Microsoft and Funk security:
By default, Funk security is enabled. It provides everything you get with
Microsoft security plus the addition of Cisco Compatible Extensions
features. It also provides additional authentication types like EAP-TTLS,
LEAP, and EAP-FAST.
Microsoft security, with its Microsoft Zero Config feature, is also
available. To switch to Microsoft security, go to
“Configuring
Microsoft Security” on page 100 to start.
Note: Your security choice does not depend on your authentication server.
For example, you can choose Funk security if you use Microsoft Active
Directory® to issue certificates.
Configuring Funk Security
You can define up to four profiles for your Funk Odyssey security.
Different profiles let your CK60 communicate in different networks
without having to change all of your security settings. For example, you can
set up one profile for the manufacturing floor and one for the warehouse.
LEAP
(Lightweight
Extensible
Authentication
Protocol)
Also known as Cisco-Wireless EAP, provides username/password based authentication between a
wireless client and a RADIUS server. In the 802.1x framework, traffic cannot pass through a wireless
network access point until it successfully authenticates itself.
EAP-PEAP
(Protected
Extensible
Authentication
Protocol)
Performs secure authentication against Windows domains and directory services. It is comparable to
EAP-TTLS both in its method of operation and its security, though not as flexible. This does not
support the range of inside-the-tunnel authentication methods supported by EAP-TTLS. Microsoft
and Cisco both support this protocol.
EAP-TLS
(Transport Layer
Security)
Based on the TLS (Transport Layer Security) protocol widely used to secure web sites. This requires
both the user and authentication server have certificates for mutual authentication. While cryptically
strong, this requires corporations that deploy this to maintain a certificate infrastructure for all their
users.
EAP-TTLS
(Tunneled
Transport Layer
Security)
This protocol provides authentication like EAP-TLS (see page 95) but does not require certificates for
every user. Instead, authentication servers are issued certificates. User authentication is done using a
password or other credentials that are transported in a securely encrypted “tunnel” established using
server certificates.
EAP-TTLS works by creating a secure, encrypted tunnel through which you present your credentials
to the authentication server. Thus, inside EAP-TTLS there is another inner authentication protocol that
you must configure via Additional TTLS Settings.
Authentication (continued)
Vista de página 108
1 2 ... 104 105 106 107 108 109 110 111 112 113 114 ... 123 124

Comentários a estes Manuais

Sem comentários