User`s manual
Chapter 3 — Configuring the CV30
42 CV30 Fixed Mount Computer User’s Manual
Each wireless network is assigned a name or SSID (Service Set
Identifier) to allow multiple networks to exist in the same area
without infringing on each other.
Intermec recommends using security with wireless networks to
prevent unauthorized access to your network and to ensure the
privacy of transmitted data. Authentication by both the network
and the user are required elements for secure networks. Use the
following table to understand some of the wireless network
terminology.
Using WPA Security
Wi-Fi Protected Access (WPA) is a strongly enhanced,
interoperable Wi-Fi security that addresses many of the
vulnerabilities of Wired Equivalent Privacy (WEP). Instead of
WEP, WPA uses Temporal Key Integrity Protocol (TKIP) for its
data encryption method.
Currently, WPA satisfies some of the requirements in the IEEE
802.11i draft standard. When the standard is finalized, WPA will
maintain forward compatibility.
WPA runs in 802.1x (Enterprise) mode or PSK (Pre-Shared Key)
mode:
• In Enterprise mode, WPA provides user authentication using
802.1x and the Extensible Authentication Protocol (EAP).
That is, an authentication server (such as a RADIUS server)
must authenticate each device before the device can
communicate with the wireless network.
• In PSK mode, WPA provides user authentication using a
shared key between the authenticator and the CV30. WPA-
PSK is a good solution for small offices or home offices that
do not want to use an authentication server.
To use WPA security, you need:
• an authentication server (Enterprise mode only).
• an access point with an 802.11 b/g radio that supports WPA.
Note: You can also use a MobileLAN access point with
software release 1.80 or later as an authentication server. For
help, see the system manual for your access point.