MX3X Reference Guide (Microsoft® Windows® CE .NET 4.2 / CE 5.0 Equipped) Copyright © 2007 by LXE Inc.
Notices LXE Inc. reserves the right to make improvements or changes in the products described in this guide at any time without notice. While reasonable efforts have been made in the preparation of this document to assure its accuracy, LXE assumes no liability resulting from any errors or omissions in this document, or from the use of the information contained herein.
Table of Contents CHAPTER 1 INTRODUCTION 1 Overview .................................................................................................................... 1 Features/Options for the MX3X Family ............................................................................................... 2 Related Manuals.................................................................................................................................... 3 Components ..........................................
ii Table of Contents Installing / Removing Cards................................................................................................................ 25 Preparation........................................................................................................................................ 25 Installation ........................................................................................................................................ 25 Removal....................................
Table of Contents CHAPTER 2 PHYSICAL DESCRIPTION AND LAYOUT iii 43 Hardware Configuration ......................................................................................... 43 Central Processing Unit....................................................................................................................... 43 System Memory .................................................................................................................................. 43 Core Logic.....................
iv Table of Contents Applying the Protective Film to the Display....................................................................................... 63 Speaker .................................................................................................................... 64 Infrared (IR) Port ..................................................................................................... 64 Power Supply ..........................................................................................
Table of Contents v Settings | Control Panel Options ........................................................................... 81 About................................................................................................................................................... 82 Language and Fonts.......................................................................................................................... 83 Identifying Software Versions.................................................
vi Table of Contents General ........................................................................................................................................... 109 Memory .......................................................................................................................................... 109 Device Name .................................................................................................................................. 110 Copyrights ..............................
Table of Contents vii Determine Your Scanner Software Version ................................................................................... 135 Barcode Processing Overview........................................................................................................ 136 Barcode Manipulation........................................................................................... 136 Main Tab ..................................................................................................
viii Table of Contents Main Tab ........................................................................................................................................ 172 Administrator Login..................................................................................................................... 173 Config Tab...................................................................................................................................... 174 Buttons ........................................
Table of Contents ix Root Certificates ............................................................................................................................... 217 Generating a Root CA Certificate .................................................................................................. 217 Installing a Root CA Certificate on the Mobile Device ................................................................. 219 User Certificates..............................................................
x Table of Contents Sample Output File ........................................................................................................................... 276 List of Valid VK Codes for CE .NET and CE .................................................................................. 278 APPENDIX B TECHNICAL SPECIFICATIONS 279 Physical Specifications ........................................................................................ 279 Display Specifications ................................
Table of Contents xi Illustrations Figure 1-1 Front ...................................................................................................................................................4 Figure 1-2 Back....................................................................................................................................................4 Figure 1-3 Endcaps .............................................................................................................................
xii Table of Contents Figure 3-9 Password Properties .........................................................................................................................95 Figure 3-10 Communication / PC Connection Tab............................................................................................96 Figure 3-11 Power Schemes...............................................................................................................................
Table of Contents Figure 5-11 Figure 5-12 Figure 5-13 Figure 5-14 Figure 5-15 Figure 5-16 Figure 5-17 Figure 5-18 Figure 5-19 Figure 5-20 Figure 5-21 Figure 5-22 Figure 5-23 Figure 5-24 Figure 5-25 Figure 5-26 Figure 5-27 Figure 5-28 Figure 5-29 Figure 5-30 Figure 5-31 Figure 5-32 Figure 5-33 Figure 5-34 Figure 5-35 Figure 5-36 Figure 5-37 Figure 5-38 Figure 5-39 Figure 5-40 Figure 5-41 Figure 5-42 Figure 5-43 Figure 5-44 Figure 5-45 Figure 5-46 Figure 5-47 Figure 5-48 Figure 5-49 Figure 5-50 Figure 5-51 Fi
xiv Table of Contents Figure 5-68 Certificates ...................................................................................................................................219 Figure 5-69 Import Certificate .........................................................................................................................219 Figure 5-70 Browsing to Certificate Location .................................................................................................
Chapter 1 Introduction Overview The LXE® MX3X is a rugged, portable, hand-held Microsoft® Windows® CE .NET 4.2 or Windows CE 5.0 equipped mobile computer capable of wireless data communications. The mobile device can transmit information using a 2.4 GHz wireless device (with an internally mounted antenna) and it can store information for later transmission through an RS-232, InfraRed, or USB port. The device can be scaled from a limited function batch computer to an integrated wireless scanning computer.
2 Overview Features/Options for the MX3X Family Feature MX3X MX3-RFID MX3P VX3X Operating System - CE .NET 4.2 X X X X Operating System - CE 5.
Overview 3 Related Manuals MX3X The “MX3X User’s Guide” contains MX3X and MX3P user information and instruction. An abbreviated user’s guide (LXEbook – MX3X User’s Guide) is available for download to the MX3X device from the LXE Manuals CD or the LXE ServicePass website. MX3-RFID The “MX3-RFID User’s Guide” and “MX3-RFID Reference Guide” contain user and technical information and instruction for the MX3-RFID mobile device.
4 Components Components Front and Back Views Figure 1-1 Front 1 2 3 4 5 6 7 8 Endcap Display Scan, Enter or Field Exit (programmable) Beeper On/Off Button 2nd LED Alt LED Ctrl LED 9 10 11 12 13 14 15 16 Shift LED Caps LED Scanner LED Backup Battery LED Status LED Main Battery LED Charger LED Scan or Enter (programmable) Figure 1-2 Back 1 2 3 4 MX3X Reference Guide Endcap Leather Handstrap Connector IR Port (Com 2 Port) Cradle Input Contacts 5 6 7 Main Battery Stylus Back Cover (MX3P only) E-EQ-M
Components 5 Endcap Options Figure 1-3 Endcaps 1 2 DC Power Jack Serial Com 3 or USB Host or Scanner Port 3 4 Serial Com 1 or USB Client Port Audio Jack MX3X / MX3P* MX3-RFID Left Port Right Port Left Port Right Port Serial COM3 Serial COM1 Scanner USB Client Serial COM3 USB Client USB Host Serial COM1 USB Host USB Client Scanner* Serial COM1 Scanner* USB Client * The MX3P does not have an integrated scanner nor an RFID tag reader.
6 Components Battery Well Vent Aperture Caution The vent aperture in the battery well should never be blocked with any device other than an approved LXE main battery. The vent aperture functions to relieve any heat or pressure that may build up in the mobile device during everyday use. Figure 1-5 Vent Aperture in Battery Well – Do Not Cover If the vent hole is covered by an object, e.g. a tracking label, other than an approved LXE main battery, the touch screen may be damaged.
When to Use This Guide 7 When to Use This Guide As the reference for LXE’s MX3X / MX3-RFID computer, this guide provides detailed information on its features and functionality. Use this reference guide as you would any other source book – reading portions to learn about the device and it’s capabillities, and then referring to it when you need more information about a particular subject. This guide takes you through all aspects of installation and configuration.
8 Getting Started Getting Started Important If the mobile device has AppLock installed, please refer to “Chapter 6 – AppLock” for setup and processing information before continuing with “Getting Started.” Note: When your mobile device is pre-configured, the client, PCMCIA card and endcaps are assembled by LXE to your specifications. This section’s instructions are based on the assumption that your new system is pre-configured and requires only accessory installation (e.g.
Getting Started 9 Insert Main Battery Press the Power button after the battery is inserted into the battery compartment. Note: New batteries must be charged prior to first use. This process takes up to four hours in an LXE Multi-Charger Plus and eight hours with an external power source connected to the power jack on the endcap of the mobile device. Figure 1-6 Battery Contacts and Main Battery The Main Battery compartment is located at the bottom of the back of the computer.
10 Getting Started Optional Devices Attach Handstrap (Optional) Note: These instructions are not to be used for the MX3P. See “Accessories” for MX3P holding accessories e.g. holster mounted, shoulder straps, etc. Once installed, the elastic handstrap provides a means for the user to secure the computer to their hand. It is adjustable to fit practically any size hand and does not interfere with battery charging when the MX3X is in a cradle.
Getting Started 11 Attach to Hip-Flip (Optional) Note: The MX3P does not fit the Hip-Flip accessory. The Hip-Flip is not to be used with the MX3P device. See “Accessories” for MX3P holding accessories e.g. holster mounted, shoulder straps, etc. Figure 1-8 Hip-Flip Accessory Note: #1 flat head screwdriver is not supplied by LXE. A waist belt accessory can be ordered from LXE.
12 Getting Started Connect External Power Supply to MX3X or Cradle (Optional) There are three external power supplies available for the mobile device and the MX3 desktop cradle: • US AC/DC 12V Power Supply • Cigarette Lighter Adapter • International AC/DC 12V Power Supply Figure 1-9 US AC/DC 12V Power Supply and Automotive Power Adapter Figure 1-10 International AC/DC 12V Power Supply The DC power jack is located on the endcap.
Getting Started 13 Connect External Power Supply to the MX3P The DC power jack is located on the endcap. The passive cradle does not have a power jack. Figure 1-12 Connect External Power Supply 1. Insert the barrel connector into the power jack on the mobile device endcap and push in firmly. 2. The CHGR LED above the keypad illuminates when the MX3P is receiving external power through the power jack.
14 Getting Started Figure 1-14 Connecting the Power Supply to the MX3P Endcap Power Jack Power Supply Dimensions Length 9.25” Height 2.5” Width 4.7” Mounting hole center Width: 3.5” Mounting hole center Length: 8.75” DIAGRAM IS NOT TO SCALE Figure 1-15 Vehicle Power Supply Footprint 1. If the mobile device is in the cradle, it can be either On or in Suspend Mode during this process. 2. Turn the Power Supply toggle switch to the Off position. 3.
Getting Started 15 Use proper electrical and mechanical fastening means for terminating the cable. Properly sized "crimp" type electrical terminals are an accepted method of termination.
16 Getting Started Connect MX3X Audio Jack (Optional) The audio jack is located on the endcap. Figure 1-17 Connect Audio Jack Insert the 2.5mm barrel end of the connector into the audio jack on the endcap and push the connector in firmly. See section titled “Set the Audio Speaker Volume”. Note: The audio option draws power from the battery. Power Button Note: Refer to the section titled “Power Modes” later in this chapter for information relating to the power states of the mobile device.
Getting Started 17 Tapping the Touchscreen with a Stylus Note: Always use the point of the stylus for tapping or making strokes on the touchscreen. Never use an actual pen, pencil, abrasive or sharp object to write on the touchscreen. Hold the stylus as if it were a pen or pencil. Touch an element on the screen with the tip of the stylus then remove the stylus from the screen. Firmly press the stylus into the stylus holder when the stylus is not in use.
18 Getting Started Entering the Multi AppLock Activation Key The appearance of taskbar icons are different on various mobile device platforms and may differ from the example shown below. This example is shown only to aid in describing how the user can switch between applications using a stylus. If RFTerm® and Microsoft® Word® were the two applications locked, and the user tapped the taskbar icon to place the popup menu on screen, a switching menu showing both application icons is displayed on the screen.
Getting Started 19 Touchscreen Calibration If the touchscreen is not responding properly to pen touch taps, you may need to recalibrate the touchscreen. Recalibration involves tapping the center of a target. If you miss the center, keep the stylus on the screen, slide it over the target’s center, and then lift the stylus. If the touchscreen is not accepting taps or needs recalibration, press + to force the Start Menu to appear.
20 Getting Started Set The Display Contrast Adjusting screen contrast lightens or darkens the characters to make them visible at a comfortable level. The contrast is incremented or decremented one step each time the contrast key is pressed. To adjust screen contrast, locate the key at the top of the keypad. Adjust the display contrast by pressing the: • 2nd key then the key • Use the Up Arrow and Down Arrow keys to adjust contrast until the display lightens or darkens to your satisfaction.
Getting Started 21 Set the Power Schemes Timers Note: Refer to the section titled “Power Modes” later in this guide for information relating to the power states of the mobile device. Select Start | Settings | Control Panel | Power | Schemes tab. Change the parameter values and tap OK to save the changes. Battery Power Scheme Use this option when the device will be running on battery power only.
22 Getting Started Set The Audio Speaker Volume Note: An application may override the control of the speaker volume. Turning off sounds saves power and prolongs battery life. The speaker is located on the front of the device above the Power button. The audio volume can be adjusted to a comfortable level for the user. The volume is increased or decreased one step each time the volume key is pressed. The device has an internal speaker and a jack for an external headset.
Setup the Client and Network 23 Setup the Client and Network Prerequisites • Network SSID or ESSID number of the Access Point • WEP or LEAP Authentication Protocol Keys See “Chapter 5 Wireless Network Configuration” for complete information. Access the Terminal Emulation Parameters Before you make a host connection, you will, at a minimum, need to know: • the alias name or IP address (Host Address) and • the port number (Telnet Port) of the host system to properly set up your host session. 1. 2. 3. 4. 5.
24 Installing PCMCIA and CF Cards Installing PCMCIA and CF Cards Figure 1-21 PCMCIA and CF Card Location There is one PC card slot (Slot 0) and one Compact Flash card slot (Slot 1) located under the endcap. Slot 0 powers a wireless client PC card, PC SRAM card, ATA Flash card or a linear Flash card. The slots hold only one card at a time. Slot 0 supplies .75 of an amp at 5V or 3.3V. The second slot (Slot 1) is designed to support a Type I or II Compact Flash disk.
Installing PCMCIA and CF Cards 25 Installing / Removing Cards Preparation Requirement: A screwdriver (not supplied by LXE) • LXE recommends that installation or removal of the card be performed on a clean, well-lit surface. • Using a screwdriver, remove or loosen the screws on the endcap. • Carefully slide the endcap to the side, taking care not to dislodge or disconnect any cables. • Remove or loosen all cables to the card(s) to be removed/replaced.
26 Enter Data Enter Data You can enter data into the mobile device through several different methods. The Scanner window accepts barcode data entry, the RS-232 and the IR port are used to input/output data, and the keypad and stylus provide manual entry. Keypad Entry The keypad is used to manually input data that is not collected otherwise.
Enter Data 27 Integrated Laser Scanner Data Entry Read all cautions, warnings and labels before using the laser scanner. To scan with the integrated laser barcode reader, point the laser window towards a barcode and press the Scan button. You will see a red laser beam strike the barcode. The laser scanner has an SE923 scan engine. Correct Scan Incorrect Scan Incorrect Scan Figure 1-22 Scan Beam Align the red beam so that the barcode is centered within the beam.
28 Enter Data Using a Headset and Voice for Data Entry Connecting the Audio Cable and a Headset Note: The audio option draws power from the main battery. The Headset and Voice option is not available for an MX3-RFID configuration. The speaker is disabled when a headset is plugged into the audio jack The headset consists of an earpiece, a microphone and an attached cable. The headset attaches to an audio cable which attaches to the MX3X. The audio jack is located on the MX3X endcap.
Enter Data 29 Entering Data Data is entered into the mobile device by speaking into the headset’s microphone when prompted. Please contact your System Administrator if assistance is needed with the voice software installed on the mobile device. Tethered Scanner Do not connect a tethered scanner cable to a USB-C or USB-H labeled endcap port. The USB ports cannot power a tethered scanner.
30 ActiveSync ActiveSync Introduction Once a relationship (partnership) has been established with Connect (on a desktop computer), ActiveSync will synchronize using the wireless link, serial port, USB or the infrared port on the mobile device. Note: ActiveSync does not transmit through the IR port in MX3 vehicle cradles. It will through the IR port of specific MX3X desktop cradles. Please refer to section titled “Accessories” for the part identified as the Desktop Cradle for the MX3X.
ActiveSync 31 Initial Setup The following instructions relate to the initial setup of ActiveSync. When there is a Connect icon on the desktop, this section can be bypassed. The partnerships can only be created using direct serial or USB cable connection. After the partnerships are established, ActiveSync communication can be initiated using serial, USB, IrDa and wireless device. See section titled “Connect and Communicate” for cable/port compatibility.
32 ActiveSync IrDA Connection Note: The ActiveSync connection does true IrDA, not serial over IR, or TCP/IP (Winsock) over IR, like many infrared connections. Therefore, it is important to use a PC infrared interface which supports the handshaking needed for ActiveSync. This, unfortunately, precludes using many brands of laptops, which only use a simple infrared interface, even though they may call it IrDA. Select Start | Settings | Control Panel | PC Connection. Tap the Change button.
ActiveSync 33 Connect and Communicate Connect the correct** cable to the PC (the host) and the mobile device (the client). Select “Connect” from the Start Menu on the client (Start | Programs | Communications | Connect). Note: Run “Connect” when the “Get Connected” wizard on the host PC is checking COM ports to establish a connection for the first time. Note: USB will start automatically when the USB cable is connected, not requiring you to select “Connect” from the start menu.
34 ActiveSync Backup Data Files using ActiveSync Use the following information to backup data files from the mobile device to a desktop or laptop PC using the appropriate cables and Microsoft’s ActiveSync. Prerequisites A partnership between the mobile device and ActiveSync has been established. See section “ActiveSync – Initial Setup”. Serial Port Transfer • A desktop or laptop PC with an available serial port and a mobile device with a serial port.
ActiveSync 35 USB Connection • Disconnect the cable from the mobile device. • Tap the status bar icon in the lower right hand corner of the status bar. Then tap the Disconnect button. IMPORTANT – Do not put the mobile device into suspend while connected via USB. The device will be unable to connect to the host PC when it resumes operation. Network Connection • Put the mobile device into suspend by tapping the red Suspend button. • Tap the status bar icon in the lower right hand corner of the status bar.
36 ActiveSync Troubleshooting ActiveSync ActiveSync on the host says that a device is trying to connect, but it cannot identify it One or more control lines are not connected. This is usually a cable problem, but on a laptop or other device, it may indicate a bad serial port. If the MX3X is already in a powered docking cradle cabled to a PC, remove and reinsert the MX3X into the powered cradle. If the MX3X is connected to a PC by a cable, disconnect the cable from the MX3X and reconnect it again.
Docking Cradles 37 Docking Cradles Note: The “MX3 Cradle Reference Guide” contains cradle installation and technical information. There are two types of cradles for the MX3X: a desktop cradle for table top charging/communication applications and a vehicle mount cradle for vehicle mounted charging/communication applications. The powered cradles give the MX3X the ability to communicate with a host computer and other equipment.
38 Docking Cradles Desktop Cradle Note: LXE recommends the correct Desktop Cradle always be used to store / charge / communicate with the MX3X. The MX3X Desktop Cradle label is located on the bottom of the device. The MX3X Desktop cradle Product Number is MX3RA002DESKCRADLE. Lower the mobile device straight into the cradle, tilt it forward and then let it rest backward in the cradle. Ensure that the mobile device is properly seated on the charging contacts.
Docking Cradles 39 ActiveSync with a Cradle To ActiveSync, the cradle must be powered off, the ActiveSync cradle cable attached to the desktop PC and the cradle, then the cradle powered up. Note: ActiveSync transfers files to the MX3X over the RS-232 connector on the cradle using the MX3X070CBLD9RS232AS cable. Note: The MX3-RFID and the MX3P use a passive, non-powered cradle (refer to “The Passive Vehicle Cradle”). ActiveSync connects only through the endcap on these devices.
40 Getting Help Getting Help All LXE user guides are now available on one CD and they can also be viewed/downloaded from the LXE ServicePass website. Contact your LXE representative to obtain the LXE Manuals CD. You can also check the LXE ServicePass website for the latest manual releases. You can get help from LXE by calling the telephone numbers listed on the LXE Manuals CD, in the file titled “Contacting LXE”. This information is also available on the LXE ServicePass website.
Getting Help R R R R R R R R R R R R R * R R R R R R R R R R R R R * R R R R R R R R Tethered Scanners Scanner, Powerscan SR, 8’ Cbl, WW Scanner, Powerscan SR, 12’ Cbl, US Scanner, Powerscan LR, 8’ Cbl, WW Scanner, Powerscan LR, 12’ Cbl, US Scanner, Powerscan XLR, 8’ Cbl, WW Scanner, Powerscan XLR, 12’ Cbl, US Scanner, LS3408ER, 9’ Cbl, US See Note Scanner, LS3408FZ, Fuzzy Logic, 9’ Cbl, US See Note Holding Accessories Strap, Hand, Nylon MX3X Nylon Holster for use with Belt MX3X Nylon Hip Flip Adjustable
42 Getting Help R R R R R R R R R R R R R R Battery, Li-Ion Cradles and Power Supplies MX3-RFID \ MX3P Passive Mounting Cradle MX3-RFID \ MX3P RAM Mounting Kit for Passive Cradle MX3X Desktop Cradle 2 MX3X Vehicle Mount Cradle 2 MX3X Vehicle Mount Cradle, 19.
Chapter 2 Physical Description and Layout Hardware Configuration The MX3X and MX3P hardware configuration is shown in the following figure. Figure 2-1 Hardware Central Processing Unit The CPU is an Intel Xscale PXA255 running at 400 MHz. System Memory A CF Card FLASH is used for ROM, Flash for Windows operating system and Flash memory for bundled applications.
44 Hardware Configuration Core Logic The mobile device supports the following I/O components of the core logic: • One PCMCIA slot (supports Type I or II PCMCIA cards). • One compact Flash card port (supports Type I and II cards). • One InfraRed port. • One Digitizer Input port (see section titled “Touchscreen”). • Two I/O ports in six configurations (see section titled “Endcaps and COM Ports.”). Video Subsystem The display has a 640 pixel (horizontal) by 240 pixel (vertical) format.
Hardware Configuration 45 Audio Interface An interface is available for headset operation. When a headset is plugged into the audio jack on the endcap, the main speaker is disabled. PCMCIA Slots Use and operation of the Personal Computer Memory Card International Association (PCMCIA) device (e.g. PC card) is dependent upon both the type of device installed and the application(s) running on the computer. Make sure the proper software is pre-loaded and PC cards are properly configured.
46 Power Modes Power Modes 1 – On 2 – Suspend 3 – Critical Suspend 4 – Off 5 – Power Button or Power Off Timer expires 6 – Primary Event 7 – Power fail. Also from Suspend (2) or On (1). 8 – Restoration of power. 9 – Backup battery and main battery dead 10 – Power applied. New main battery installed or external power applied. Tap the Power button. Note: After event 8, the only primary event (6) which functions is a power button tap.
Power Modes 47 On Mode The Display When the display is On: • the keyboard, touchscreen and all peripherals function normally • the display backlight is on until the Backlight timer expires (default is 3 seconds) 15 seconds afterwards, the display turns off. • when the main battery is hot-swapped, the display is turned Off.
48 Power Modes System Idle Mode Note: When the display is Off, the unit is still On. The unit functions normally – tethered scanner trigger press or integrated scanner Scan key press will cause scans. Communications through the network or serial ports continue. System Idle timers are set using Start | Settings | Control Panel | Power | Schemes tab. The display is turned off when the System Idle timer expires before a wakeup event takes place.
Power Modes 49 Critical Suspend Mode The purpose of the Critical Suspend mode is to reduce power consumption to a lower level that still retains the contents of SDRAM. The device enters Critical Suspend Mode only when the main battery has failed or is removed/hot-swapped. The backup battery is supplying power to the unit during Critical Suspend Mode.
50 Physical Controls Physical Controls Power Button Note: Refer to the section titled “Power Modes” for information relating to the power states of the mobile device. The power button is located above the ESC key on the keypad. When a battery is inserted for the first time, the Power button must be pressed. Figure 2-3 Location of the Power (PWR) Button Quickly tapping the Power button places the device immediately in Suspend mode.
Physical Controls 51 Endcaps and COM Ports The computer supports three COM port options. Two external serial ports are dependent on the end cap chosen. A third serial port is used to support an infrared transciever (barcode reader). An additional endcap configuration supports serial and USB “slave” input/output at 1.5 MBps.
52 Physical Controls Endcap Combinations Left Port Right Port Serial COM3 Serial COM1 Serial COM3 USB Client USB Host Serial COM1 USB Host USB Client Scanner* Serial COM1 Scanner* USB Client Rear IR Port is COM2 Barcode scanners, tethered to the serial port on a cradle, send ASCII data to the MX3X in the cradle through the COM2 Port. Figure 2-6 Endcap Combinations * The MX3P does not have an integrated scanner nor an RFID tag reader and antenna.
Physical Controls 53 Integrated Scanner Port The integrated laser barcode scanner is used to collect barcode data from any nearby compatible barcode label. Depending on the size of the barcode, size of bars and spacing and quality of the barcode, the scanner is used to read barcodes between 3” and 30”. The barcode scanner reads UPC/EAN, Code 39, Code 93, I 2 of 5, Discrete 2 of 5, Code 128, Codabar and MSI symbologies. The integrated laser scanner scans only when the Scan button is pressed.
54 Physical Controls LXE Connection Cable Technical Specification The exact serial cable is crucial. Many commercial null modem cables will not work. LXE recommends the following cable: Serial cable: 9000A054CBL6D9D9 Pinout: D9 female 1 2 3 4 5 6, 8 7 9 D9 female 7 3 2 6, 8 5 4 1 no connection Figure 2-9 Pinout – Serial Cable for Synchronization Some laptop devices do not properly implement all control lines on the serial port – the laptop connection will not work.
Physical Controls 55 USB Host / Client Port USB Host / Client connection is made through an optional USB Port if installed. The connector is an industry-standard 9-pin “D” male connector. The optional LXE USB cable is required to adapt the connection to a standard USB connector. Please refer to section titled “Accessories” for the USB part number when ordering.
56 Physical Controls USB Client Cable Port Label on Endcap Mobile Device End 1 2 3 4 5 6 7 8 9 Not Used Not Used D + (Green Wire) Not Used Ground (Black Wire) Not Used D – (White Wire) Not Used Power Goes To USB Type B Plug End 3 4 2 1 Figure 2-12 USB Type B to Serial Port Cable Pinout Connect from USB-H serial port to USB Type B Male receptacle on a USB hub, camera, etc. Tethered Scanners Do not connect a tethered scanner cable to a mobile device’s USB-C or USB-H labeled endcap port.
Physical Controls 57 Programmable Scan Buttons Figure 2-13 Programmable Buttons There are two buttons, one on each side of the display. The buttons can be programmed to perform specific functions. The programmable keys have no effect on barcode scanners tethered to the device. When there is no integrated scanner installed, both buttons default to Enter buttons (with the exception of IBM 5250 terminal emulation devices – in this case, the left button is labelled and functions as “Field Exit”).
58 The Keypad The Keypad The QWERTY keypad is phosphorescent. A phosphorescent keypad does not use a keypad backlight but glows in dim/dark areas after exposure to a light source. Figure 2-14 The QWERTY Keypad The keymaps (keypress sequences) are located in “Appendix A – Key Maps.” Key Functions Key Function Scan (Scanner integrated into endcaps only.) The Scan key activates the scanner when a scanner endcap is installed and the Scan button is pressed.
The Keypad 59 Key Function Alt The Alt key enables the alternate functions of the keypad. This function is similar to a regular keyboard’s Alt key. Note that the Alt key only stays active for one keystroke. Each time you need to use an alternate function, you need to press the Alt key before pressing the desired key. When the Alt function is active, the Alt LED illuminates. Shft The Shft key enables the shifted functions of the keypad. This function is similar to a regular keyboard’s Shift key.
60 The Keypad Custom Key Maps Custom Key Maps should not be confused with the process the system administrator uses to remap the Scan buttons on either side of the touchscreen display. See Appendix A “Keymaps”, section titled “Creating Custom Keymaps”. To activate the Custom keymap, select Start | Settings | Control Panel | Keyboard icon. Select the Custom keymap from the keyboard popup menu, and close the control panel with the OK button.
The Keypad 61 LED Functions Figure 2-15 LED Functions Across the top of the keypad are LEDs that provide visual cues to current computer operation. When the LED is not illuminated, the function is inactive. LED 2 nd When illuminated ... The next keypress is a 2nd keypress. • • ALT The next keypress is an ALT keypress. • CTRL Amber when on and unlit when off. Uppercase letters are active until the CAPS key sequence is pressed again. • SCNR Amber when on and unlit when off.
62 Display Display The touchscreen display is an LCD unit capable of supporting VGA graphics modes. Display size is 640 x 240 pixels. The display covering is designed to resist stains. The touchscreen allows signature capture and touch input. A pen stylus is included. The touchscreen responds to an actuation force (touch) of 4 oz. of pressure (or greater). There are two types of displays available: transflective greyscale monochrome and transmissive color.
Display 63 Cleaning the Glass Display/Scanner Aperture Note: These instructions are for components made of glass. If there is a removable protective film sheet on the display screen, remove the film sheet before cleaning the screen. Keep fingers and abrasive or sharp objects away from the scan aperture and display. If the glass becomes soiled or smudged, clean only with a standard household cleaner such as Windex(R) without vinegar or use Isopropyl Alcohol.
64 Speaker Speaker The speaker is located on the front of the mobile device above the Power button. The Speaker has a loudness of at least 90 dB (2700 Hz) at 10 cm measured from the front of the unit. The Speaker volume is adjustable via the keypad or the Control Panel or by an application through the use of an API call. There are 16 distinct volume levels. The minimum volume level is 0 (no sound) with a default setting of maximum non-distorted volume. The volume sticks at maximum and minimum levels.
Power Supply 65 Power Supply Note: LXE recommends that the correct MX3 Multicharger Plus always be used to charge the mobile device’s main battery. The Multicharger plus label is located on the back of the device and the charger must have been upgraded to V1.01 to charge the mobile device’s main battery pack to 100%. Please contact your LXE representative for further information about theV1.01 upgrade kit, if needed.
66 Power Supply Li-Ion Battery When disposing of the main battery, the following precautions should be observed: The battery should be disposed of promptly. The battery should not be disassembled or crushed. The battery should not be heated above 212°F (100°C) or incinerated. Main Battery The main battery has a rugged plastic enclosure that is designed to withstand the ordinary rigors of an industrial environment.
Power Supply 67 The Low Battery Warning will transition to Critical Suspend before the computer powers off. Critical Suspend State The Critical Suspend state or mode can only be entered because of a main battery Power failure. A main battery Power failure can occur because the battery’s energy has been depleted or the battery has been removed.
68 Battery Chargers Battery Chargers Note: LXE recommends that the correct MX3 Multicharger Plus always be used to charge the main battery. The Multicharger plus label is located on the back of the device and the charger must have been upgraded to V1.01. Please contact your LXE representative for further information about the V1.01 upgrade kit, if needed. MX3 Multi-Charger Plus Figure 2-18 MX3 Multi-Charger Plus The main battery can be charged in the MX3 Multi-Charger Plus.
Battery Chargers 69 Important Battery Charger Version Information Battery Chargers Affected MX3 Multi-Charger Plus 9000A377CHGR5 Use LXE V1.01 Upgrade Kit MX3 Multi-Charger MX3A378CHGR6 (Not Available After 7-2003) Use LXE V1.20 Upgrade Kit The MX3X main battery will be incompatible with MX3 Battery Chargers that have not been upgraded to V1.20 or V1.01. To successfully charge the mobile device Battery Pack, pre-existing MX3 Battery Chargers must be returned to LXE for a software upgrade.
70 Battery Chargers External Power Supply (Optional) The DC power jack is located on the endcap. The main battery is trickle-charged using external power supplies. The cradle power jack is located on the back of the cradle.The mobile device (and the Desktop Cradle) connect to any of the following power supplies through the DC Power Jack.
Chapter 3 System Configuration Introduction There are several different aspects to the setup and configuration of the mobile device. Many of the setup and configuration settings are dependent upon the optional features such as installed hardware and software. The examples found in this chapter are to be used as examples only, the configuration of your specific mobile device computer may vary.
72 Installed Software Software Load The software loaded on the mobile computer consists of Windows CE .NET 4.2 or Windows CE 5.0 OS, hardware-specific OEM Adaptation Layer, device drivers, Internet Explorer 6.0 for Windows CE browser and utilities. The software supported is summarized below: Operating System • Full Operating System License: Includes all operating system components, including Windows CE 5.0 or CE .NET 4.
Installed Software 73 LXE RFTerm (Option) Installed by LXE. The application can be accessed by tapping Start | Programs | RFTerm. Please refer to “Terminal Emulation Setup” earlier in this guide for RFTerm quick start instruction. Refer to the “RFTerm Reference Guide” on the LXE Manuals CD for complete information and instruction. WAV files added by the user should be stored in System\LXE\RFTerm\Sounds. AppLock (Option) Installed by LXE.
74 Desktop Desktop For general use instruction, please refer to commercially available Windows CE .NET 4.2 or Windows CE 5.0 user’s guides or the Windows on-line Help application installed in the mobile device. The Desktop appearance is similar to that of a desktop PC running Windows 2000 or XP. At a minimum, it has the following icons that can be tapped with the stylus to access My Computer, Internet Explorer, and the Recycle Bin. At the bottom of the screen is the Start button.
Desktop 75 My Computer Folders (CE .NET 4.
76 Start Menu Program Options Start Menu Program Options The following options represent the factory default program installation. Your Program options may be different based on the software and hardware options purchased. Note that there can be only one wireless client installed at a time. The client driver configuration utility chosen is based on the type of installed wireless client card (Cisco, Summit, Symbol).
Start Menu Program Options 77 Communication Access: Note: Start | Programs | Communication Some communication menu options require an external modem connection to the mobile device. Modems are not available from LXE nor supported by LXE. ActiveSync After a connect setup is selected, Start | Programs | Communication | Connect will start to connect to a host.
78 Start Menu Program Options Command Prompt Access: Start | Programs | Command Prompt Figure 3-1 Pocket CMD Prompt Screen Type help at the command prompt for a list of available commands. Exit the Command Prompt by typing exit at the command prompt or select File | Close. Inbox Access: Start | Programs | Inbox This option requires a connection to a mail server. There are a few changes in the CE version of Inbox as it relates to the general desktop Windows PC Microsoft Outlook Inbox options.
Start Menu Program Options 79 Remote Desktop Connection Access: Start | Programs | Remote Desktop Connection There are few changes in the CE version of Remote Desktop Connection as it relates to the general desktop Windows PC Microsoft Remote Desktop Connection options. Select a computer from the drop down list and tap the Connect button. Tap the Options >> button to access the General, Display, Local Resources, Programs and Experience tabs. Tap the "?" button to access Remote Desktop Connection Help.
80 Start Menu Program Options Taskbar Access: Start | Settings | Taskbar and Start Menu The Taskbar can also be accessed by tapping on the taskbar and holding the stylus on the taskbar. Choose Properties from the popup menu. Factory Default Settings Always on Top Enabled Auto hide Disabled Show Clock Enabled There are a few changes in the CE version of Taskbar as it relates to the general desktop PC Windows Taskbar options.
Settings | Control Panel Options 81 Settings | Control Panel Options Access: Start | Settings | Control Panel or My Computer icon | Control Panel (CE 4.2) or My Device icon | Control Panel (CE 5.0) Getting Help Please tap the “?” box to get Help when changing Settings options. Option Function About Displays software, hardware, versions and network IP. No user intervention allowed.
82 Settings | Control Panel Options Option Function Password Set access password properties for signon and/or screen saver. PC Connection Control the connection between the mobile device and a local desktop or laptop computer. PCMCIA Network card in Slot 0, Internal ATA in Slot 2. Power Set Power scheme properties. Review device status and properties. Regional Settings Set appearance of numbers, currency, time and date based on country region and language settings.
Settings | Control Panel Options 83 Modify the Registry using the Registry Editor (see section titled “Utilities”). LXE recommends caution when editing the Registry and also recommends making a backup copy of the registry before changes are made. The registry settings for the Version window are under HKEY_LOCAL_MACHINE \ Software \ LXE \ Version in the registry. Create a new string value under this key. The string name should be the Application name to appear in the Version window.
84 Settings | Control Panel Options Accessibility Access: Start | Settings | Control Panel | Accessibility Customize the way the keyboard, sound, display, mouse, automatic reset and notification sound function. There are a few changes from general desktop Accessibility options. Adjust the settings and tap the OK box to save the changes. The changes take effect immediately.
Settings | Control Panel Options 85 Battery Access: Start | Settings | Control Panel | Battery View the status of the Main and Backup batteries. Battery Battery Voltage: Main: Status: 12.121 V (raw=3485) Backup: 5.099 V (raw=2167) Jacked Charge Discharge Figure 3-3 Battery The Battery tab shows the status and the percentage of power left in the main battery. It also shows the status of the backup battery. The listed values cannot be changed by the user.
86 Settings | Control Panel Options Certificates Access: Start | Settings | Control Panel | Certificates Manage digital certificates used for secure communication. Lists the Stored certificates trusted by the mobile device user. These values may change based on the type of network security resident in the client, access point or the host system. See Chapter 5 “Wireless Network Security” section titled “Certificates” for instruction. Lists the Stored certificates trusted by the MX3X user.
Settings | Control Panel Options 87 Date/Time Access: Start | Settings | Control Panel | Date/Time Icon Set Date, Time, Time Zone, and assign a Daylight Savings location after a warm boot or a cold boot or at anytime. Factory Default Settings Current Time Midnight Time Zone GMT-05:00 Daylight Savings Disabled Note: (CE .NET 4.2 only) Date and time is reset to the factory default value each time the mobile device is cold booted.
88 Settings | Control Panel Options Dialing Access: Start | Settings | Control Panel | Dialing Set dialup properties for internal modems (modems are not supplied/supported by LXE). Factory Default Settings Location Work Area Code 425 Tone Dialing Enabled Country/Region 1 Disable Call Waiting Disabled Dialing Properties When dialing from: New ... Remove Local settings are: Dialing Patterns ...
Settings | Control Panel Options 89 Display Access: Start | Settings | Control Panel | Display Icon Set background graphic, color scheme appearance, and power scheme properties. Factory Default Settings Background Tile Appearance Scheme: Monochrome Color Backlight Battery Power Auto Turn Off Idle Time External Power Auto Turn Off Idle Time Windows CE or CE .
90 Settings | Control Panel Options Input Panel Access: Start | Settings | Control Panel | Input Panel Select the current key / data input method. Factory Default Settings Input Method Allow applications to change input panel state Keys Use gestures Keyboard Disabled Small keys Disabled Use this option to make the Soft Keyboard or the integrated keypad primarily available when entering data. Selecting Keyboard enables both.
Settings | Control Panel Options Factory Default Settings Enable web scripting Display script error note Underline links 91 Enabled Disabled Never Windows CE 5.0 Set General, Connection, Security, Privacy, Advanced and Popups options for Internet connectivity. Select a tab. Adjust the settings and tap the OK box to save the changes. Changes are saved from tab to tab. Tap the “X” box to ignore all changes. The changes take effect immediately. Tap the “?” button for Help.
92 Settings | Control Panel Options Keyboard Access: Start | Settings | Control Panel | Keyboard Icon Set keypad key map and keypad key repeat delay and key repeat rate. Factory Default Settings Repeat Enable Delay Short Rate Slow Key Map 0409 (CE .NET 4.2) Default (CE 5.0) There is no change from general desktop PC Keyboard Properties options. Adjust the settings and tap the OK box to save the changes. The changes take effect immediately.
Settings | Control Panel Options 93 Mouse Access: Start | Settings | Control Panel | Mouse Set the double-tap sensitivity for stylus taps on the touchscreen. Network and Dialup Connections Access: Start | Settings | Control Panel | Network and Dialup Connections Create a dialup, direct, or VPN connection on the mobile device. To configure the mobile device to use DHCP or a fixed IP address, select the desired connection. The default is to obtain an IP address via DHCP.
94 Settings | Control Panel Options Owner Access: Start | Settings | Control Panel | Owner Icon Set mobile device owner details. Factory Default Settings Identification Name, Company, Address, Telephones Display at power-on Notes Notes Display at power-on Network ID User Name Password Domain Blank Disabled Blank Disabled Blank Blank Blank Enter the information and tap the OK box to save the changes. The changes take effect immediately.
Settings | Control Panel Options 95 Password Access: Start | Settings | Control Panel | Password Icon Set user access and power up password properties. Factory Default Settings Password Blank Enter at Power On Disabled Enter at Screen Saver Disabled Note: Once a password is assigned, each Settings option requires the password be entered before the Settings option can be accessed. If you forget the password, it cannot be restored without performing a cold boot on the unit (which erases all memory).
96 Settings | Control Panel Options PC Connection Access: Start | Settings | Control Panel | PC Connection Control the connection between the mobile device and a nearby desktop/laptop computer. Factory Default Settings Allow Connection Enabled Connect Using ‘USB Client’ Tap the Change button to adjust the settings and tap the OK button to save the changes. The changes take effect immediately. Unchecking the “Allow connection with …..” disables ActiveSync. Change ….
Settings | Control Panel Options 97 PCMCIA Access: Note: Start | Settings | Control Panel | PCMCIA Network card in Slot 0, Internal ATA in Slot 2. Factory Default Settings Slot 0 Disable slot now Power slot during sleep (3.3v) Power slot during sleep (5v) Write protect slot Slot 1 Disable slot now Power slot during sleep (3.3v) Power slot during sleep (5v) Write protect slot Slot 2 Disable slot now Power slot during sleep (3.
98 Settings | Control Panel Options Power Access: Start | Settings | Control Panel | Power Set Power Off, Backlight properties. Review battery status and perform backup battery charging/discharging. Adjust the settings and tap the OK box to save the changes. Changes are saved across tabs. Tap the “X” box to discard any changes. Tap the “?” for Help. The changes take effect immediately. Note: Control Panel parameters established in Power Properties affect the mobile device operating system.
Settings | Control Panel Options 99 Schemes Figure 3-11 Power Schemes Adjust the settings and tap the OK box to save the changes. The changes take effect immediately. Battery Power Scheme Use this option when the device will be running on battery power only.
100 Settings | Control Panel Options Regional Settings Access: Start | Settings | Control Panel | Regional Settings Set the appearance of numbers, currency, time and date based on regional and language settings. Adjust the settings and tap the OK box to save the changes. The changes take effect immediately. Options (and defaults) for the regional settings depend on the fonts included in the OS image. Please refer to the section on the About control panel earlier in this chapter for more details. CE .
Settings | Control Panel Options 101 Scanner Access: Start | Settings | Control Panel | Scanner Set scanner keyboard wedge, scanner icon appearance, active scanner port, and scan key settings. Assign baud rate, parity, stop bits and data bits for available COM ports. Scanner parameters apply to the MX3X integrated scan engine only. Barcode manipulation parameters apply to barcodes scanned by the integrated scan engine only.
102 Settings | Control Panel Options Factory Default Settings Factory Default Settings Main Port 1 Internal Port 2 Disabled Power Port 1 while asleep Disabled Send key messages WEDGE Enabled Keys Left Scan Right Enter COM Ports (COM1- COM2 – COM3) Baud Rate 9600 Parity None Stop Bits 1 Data Bits 8 Notes: • If the internal scanner has to be configured to operate at any communication settings other than 9600, N, 8, 1 and the computer either loses power or a cold boot command is entered, the Scanner applet m
Settings | Control Panel Options 103 Main Scanner Control Main Keys COM1 COM2 COM3 Port 2 Port 1 Power Port 1 while asleep Send Key Messages (WEDGE) Figure 3-13 Scanner Properties / Main Tab Adjust the settings and tap the OK box to save the changes. The changes take effect immediately. If “Power Port 1 while asleep” is checked, whichever serial port is enabled as Port 1 will remain powered while the device is in Suspend, at the cost of reduced battery life.
104 Settings | Control Panel Options Keys Figure 3-14 Scanner Properties / Keys Tab See the “MX3-RFID Reference Guide” when using an MX3X with an RFID Module. The Keys tab sets up what happens when one of the Scan keys are pressed. Note that the two keys can do the same or different functions. Assigned Function Disabled When either scan key is set to Disabled, it does nothing when pressed. Scan When set to “Scan” the integrated scanner is activated.
Settings | Control Panel Options 105 Change a Virtual Key (F20 or F21) Value Modify the Registry using the Registry Editor (see section titled “Utilities”). LXE recommends caution when editing the Registry and also recommends making a backup copy of the registry before changes are made. Go to HKEY_LOCAL_MACHINE \ Software \ LXE \ Scanner.
106 Settings | Control Panel Options Storage Manager Access: Start | Settings | Control Panel | Storage Manager Installed storage devices are listed by device name in the dropdown box. To view information about the disk or perform store operations, select a device from the list. On-line help is available for this option.
Settings | Control Panel Options 107 Stylus Access: Start | Settings | Control Panel | Stylus Set double-tap sensitivity properties and/or calibrate the touch panel. Double Tap Follow the instructions on the screen and tap the OK box to save the changes. The changes take effect immediately. Calibration Press and hold the stylus on the center of the target as it moves around the screen. Press Enter to keep the new calibration settings or Esc to cancel.
108 Settings | Control Panel Options System Access: Start | Settings | Control Panel | System Icon Review System and Computer data and revision levels. Adjust Storage and Program memory settings. Factory Default Settings General Memory Device Name Device Description Copyrights N/A 1/3 storage, 2/3 programs.
Settings | Control Panel Options 109 General System Properties General Memory Device Name Copyrights System Microsoft Windows Version 4.20 CE .NET Computer Processor Type: Expansion Slots: 1996-2003 Microsoft Corp. All rights reserved. This computer program is protected by U.S. and International copyright laws. Memory: 38220 KB RAM Registered to: Figure 3-18 System / General tab System: This screen is presented for information only. The System parameters cannot be changed by the user.
110 Settings | Control Panel Options Device Name System Properties General Memory Device Name Copyrights These settings are used to identify your Windows CE device to other computers. Please type a name (without any spaces) and a short description. Device name: Device description: Figure 3-20 System / Device Name The device name and description can be changed. Enter the name and description using either the keypad or the Input Panel and tap OK to save the changes. The changes take effect immediately.
Settings | Control Panel Options 111 Volume and Sounds Access: Start | Settings | Control Panel | Volume & Sounds Icon Set volume parameters and assign sound wav files to CE events. Factory Default Settings Volume Events Enabled Application Enabled Notifications Enabled Volume Middle of Bar Key click Loud Screen tap Loud Sounds Scheme LOUD! Follow the instructions on the screen and tap the OK box to save the changes. The changes take effect immediately.
112 Utilities Utilities These utilities are pre-loaded by LXE. LAUNCH.EXE All applications to be installed into persistent memory are normally in the form of Windows CE CAB files. These CAB files exist as separate files from the main installation image, and need to be copied to the mobile device using an internal ATA card or from a PC using ActiveSync. The CAB files are loaded into the folder System, which is the internal ATA drive.
Utilities 113 is a DWORD, representing the number of seconds to wait after installing the CAB file, but before activating the slot (a latency to allow the thread loading the driver to finish installation). The default value of 0 means the slot is not powered on. The default values for the default wireless client drivers (listed below) is 1, meaning one second elapses between the CAB file loading and the slot powering up. Note that the auto-launch process can also launch batch files (*.
114 Utilities ; this key runs RFTERM as a startup app [HKEY_LOCAL_MACHINE\SOFTWARE\LXE\Persist\RFTERM] "FileName"="\WINDOWS\LXE\RFTERM.EXE" "FileCheck"="dummy" “Order”=dword:40 ; this key installs APPLOCK from the CAB file [HKEY_LOCAL_MACHINE\SOFTWARE\LXE\Persist\AppLockInstall] "FileName"="\SYSTEM\APPLOCK.CAB" "FileCheck"="\WINDOWS\APPLOCK.EXE" “Order”=dword:0 ; this key runs the APPLOCK prep app [HKEY_LOCAL_MACHINE\SOFTWARE\LXE\Persist\AppLockPrep] "FileName"="\WINDOWS\APPLOCKPREP.
Utilities 115 [HKEY_LOCAL_MACHINE\SOFTWARE\LXE\Persist\COPYFOLDERS] "FileName"="COPYFOLDERS" "FileCheck"="" “Order”=dword:0F To have files (CAB, EXE, REG, or WAV files) loaded on startup, when sequence of execution is not important, you can put these files in the \System\Startup folder (on the internal ATA card). This is parsed by the Launch utility, and these programs are started or executed. Note that this only works on images from .01D and newer. REGEDIT.EXE Before using REGEDIT.
116 Utilities Disabling the Touchscreen To disable the touchscreen, run \Windows\TouchDisable.reg and perform a warm reboot. To enable the touchscreen, run \Windows\TouchEnable.reg and perform a warm reboot. Note: These utilities affect the behavior of the touchscreen on warmboot. After a coldboot, the touchscreen is enabled. Enable this option with caution when switching from AppLock Administrator mode to AppLock User Mode.
API Calls 117 Command-line Utility Command line utilities can be executed by Start | Run | [program name]. COLDBOOT.EXE Command line utility which performs a cold boot (all data in RAM is erased). The command is not case-sensitive. Passwords are lost upon cold boot. If a password is set, that password must be entered to begin the cold boot power cycle process. PrtScrn.EXE Command line utility which performs a screen print and saves the file in .BMP format in the \System folder.
118 Wavelink Avalanche Enabler Configuration Wavelink Avalanche Enabler Configuration An MX3X device manufactured before October 2006 must have drivers and system files upgraded before it can use the Avalanche Enabler functions. Please contact an LXE representative for details on upgrading the mobile device baseline. If the user is NOT using Wavelink Avalanche to manage their mobile device, the Enabler should not be installed on the mobile device. Briefly . . .
Wavelink Avalanche Enabler Configuration 119 Stop the Enabler Service To stop the Enabler from monitoring for updates from the Management Console: 1. Open the Enabler Settings Panels by tapping the Avalanche icon on the desktop. 2. Select File | Settings. Enter the password. 3. Select the Startup/Shutdown tab. 4. Select the “Do not monitor or launch Enabler” parameter to prevent automatic monitoring upon startup. 5.
120 Wavelink Avalanche Enabler Configuration Mobile Device Wireless and Network Settings Once the connection to the Agent is established, the Enabler will attempt to apply all network and wireless settings contained in the active profile. The success of the application of settings is dependent upon the local configuration of control parameters for the Enabler. These local parameters cannot be overridden from the Avalanche Management Console.
Wavelink Avalanche Enabler Configuration 121 Enabler Configuration The Enabler user interface application is launched by clicking: either the Avalanche icon on the desktop or Taskbar Avalanche Icon or selecting Avalanche from the Programs menu. The opening screen presents the user with the connection status and a navigation menu.
122 Wavelink Avalanche Enabler Configuration File Menu Options Connect The Connect option under the File menu allows the user to initiate a manual connection to the Agent and Management Console. The connection methods, by default, are wireless and COM connections. Any updates available will be applied to the mobile device immediately upon a successful connection. Abort Stop transmission.
Wavelink Avalanche Enabler Configuration 123 Avalanche Update Settings Access: Start | Avalanche | File | Settings Use these menu options to setup the Avalanche Enabler on the mobile device. LXE recommends changing and then saving the changes (reboot) before connecting to the network. Alternatively, the Agent on the Wavelink Avalanche Management Console can be disabled until needed (refer to the Wavelink Avalanche Manager User Guide for details).
124 Wavelink Avalanche Enabler Configuration Connection Figure 3-23 Connection Options Avalanche Server Address Enter the IP Address or host name of the Agent assigned to the mobile device. Check Serial Connection Indicates whether the Enabler should first check for serial port connection to the Agent before checking for a wireless connection to the Agent. Disable ActiveSync Disable ActiveSync connection with the Agent.
Wavelink Avalanche Enabler Configuration 125 Execution Note the dimmed options on this panel. This menu option is designed to manage downloaded applications for automatic execution upon startup. Figure 3-24 Execution Options (Dimmed) Auto-Execute Selection An application that has been installed with the Avalanche Management system can be run automatically following each boot.
126 Wavelink Avalanche Enabler Configuration Server Contact Figure 3-25 Server Contact Options Sync Clock Reset the time on the mobile computer based on the time on the Agent host PC. Contact at startup Connect to the Agent when the Enabler is accessed. Contact when cradled Initiate connection to the Agent based on a docking event. Contact Periodically Allows the administrator to configure the Enabler to contact the Agent and query for updates at a regular interval beginning at a specific time.
Wavelink Avalanche Enabler Configuration 127 Startup/Shutdown LXE recommends using LXE AppLock for this function. AppLock is resident on each mobile device with a Windows OS. AppLock configuration instructions are located in Chapter 6. Figure 3-26 Startup / Shutdown Options Do not monitor or launch Enabler When the device boots, do not launch the Enabler application and do not attempt to connect to the Agent.
128 Wavelink Avalanche Enabler Configuration Scan Config Note: Scan Config functionality is a standard option of the Wavelink Avalanche System but is not currently supported by LXE on Windows CE. Figure 3-27 Scan Config Option Display Figure 3-28 Window Display Options Update Window Display The user interface for the Enabler can be configured to dynamically change based on the status of the connection with the Agent. At startup Half screen, Hidden or Full screen. Default is Half screen.
Wavelink Avalanche Enabler Configuration 129 Shortcuts LXE recommends using LXE AppLock for this function. AppLock is resident on each mobile device with a Windows OS. AppLock configuration instructions are located in Chapter 6. Figure 3-29 Application Shortcuts Configure shortcuts to other applications on the mobile device. Shortcuts are viewed and activated in the Programs panel. This limits the user’s access to certain applications when the Enabler is controlling the mobile device display.
130 Wavelink Avalanche Enabler Configuration Adapters Note: LXE recommends the user review the network settings configuration utilities and the default values in Chapter 5 before setting All Adapters to Enable in the Adapters applet. Figure 3-30 Adapters Options – Network Manage Network Setting When enabled, the Enabler will control the network settings. This parameter cannot be configured from the Avalanche Management Console and is enabled by default.
Wavelink Avalanche Enabler Configuration Avalanche Icon 131 Selecting the Avalanche Icon will access the Avalanche Network Profile tab which will display current network settings. Figure 3-31 Avalanche Network Profile Displayed Use Manual Settings When enabled, the Enabler will ignore any network or wireless settings coming from the Avalanche Management Console and use only the network settings on the mobile device.
132 Wavelink Avalanche Enabler Configuration When you download a profile that is configured to manage network and wireless settings, the Enabler will not apply the manage network and wireless settings to the adapter unless the global Manage wireless settings and Manage network settings options are enabled on the Adapters panel (see Figure titled Adapters Options – Network).
Reflash the Mobile Device 133 Reflash the Mobile Device Note: When reflashing, LXE recommends using a Compact Flash card that is greater than 64MB. Files to be loaded on the CF card are: NK.BIN, EBOOT.NB0, XSCALE.BIT Caution ! Make sure the main battery has been fully charged before beginning the reflash procedure. Depleting the backup battery during the reflash process can result in corrupted files.
134 Clearing Persistent Storage How To: Reflash using TAG file Method 1. Place the compact flash card with new image files on it in the right hand slot. 2. Double-tap My Computer, then Storage Card folder. 3. Select NK.BIN, EBOOT.NB0, XSCALE.BIT. Select Edit | Copy. 4. Tap Back Arrow. Double-tap \System folder. 5. Select Edit | Paste. When asked “Overwrite ?”, tap Yes to All. 6. Additionally a REFLASH.TAG file is needed to trigger the reflash.
Chapter 4 Scanner Introduction Access: Start | Settings | Control Panel | Scanner Set scanner keyboard wedge parameters, enable or disable symbologies from being scanned, scanner icon appearance, active scanner port, and scan key settings. Assign baud rate, parity, stop bits and data bits for available COM ports. Determine Your Scanner Software Version Integrated Scanner Programming Guide and the Reset All barcode.
136 Barcode Manipulation Barcode Processing Overview Note: Steps 1-7 describe the barcode manipulation. Steps 8-12 describe how the manipulated data is built. Step 13 describes how the manipulated data is output. The complete sequence of barcode processing is as follows: 1. Scanned barcode is tested for a code ID. If one is found, it is stripped from the data, and the settings for the symbology specified are used. Otherwise, the All symbology settings are used. 2.
Barcode Manipulation 137 Factory Default Settings Main Bluetooth Disabled (Dimmed) Output enable Disabled (Dimmed) COM3 Disabled (Dimmed) Keys Left Scan key Scan Right Scan key Enter key COM Ports (COM1 - COM2 – COM3) Baud Rate 9600 Parity None Stop Bits 1 Data Bits 8 Power on Pin 9 (+5v) Disabled Barcode Enable Code ID None Symbology Settings Enable Dimmed / Min - 1 to Max - all AIM (ID) Enable Dimmed Symbol (ID) Enable Dimmed Custom Null Control Character Disabled Translate All Disabled Character/Replace
138 Barcode Manipulation Main Tab Access: Start | Settings | Control Panel | Scanner | Main Figure 4-2 Scanner Control / Main Tab Adjust the settings and tap the OK box to save the changes. The changes take effect immediately. When Power Port 1 while asleep is checked, whichever serial port is enabled as Port 1 will remain powered while the device is in Suspend, at the cost of reduced battery life. This allows a tethered scanner to wake the device by pressing the trigger on the scanner.
Barcode Manipulation 139 Keys Tab Access: Start | Settings | Control Panel | Scanner | Keys Figure 4-3 Scanner Control / Keys Tab The Keys tab sets up what happens when one of the Scan keys are pressed. Note that the two keys can do the same or different functions. Note: The left and right Scan buttons have no effect on tethered external scanners connected to an RS-232 connector on the endcap. Assigned Function Disabled When either scan button is set to Disabled, it does nothing when pressed.
140 Barcode Manipulation COM Port Tabs Access: Start | Settings | Control Panel | Scanner | COM1 or COM2 or COM3 Do not connect a tethered scanner to the USB labelled ports: COM1, COM2 and COM3 Panel Options are Identical. Figure 4-4 Scanner Control / COM Port Tab Adjust the settings and tap the OK box to save the changes. The changes take effect immediately. The COM 1 tab contains the same parameters as the COM 2 and COM 3 Tab. “Power on Pin 9” on the COM 2 panel is disabled.
Barcode Manipulation 141 Barcode Tab Access: Start | Settings | Control Panel | Scanner | Barcode The Scanner application (Wedge) can only enable or disable the processing of a barcode inside the Wedge software. The Scanner application enables or disables the Code ID that may be scanned. Enabling or disabling a specific barcode symbology is done manually using the configuration barcode in the Integrated Scanner Programming Guide (available on the LXE Manuals CD and the LXE ServicePass website).
142 Barcode Manipulation Enable Code ID This parameter programs the internal scanner to transmit the specified Code ID and/or determines the type of barcode identifier being processed. If the scanner being configured is not an integrated scanner, the scanner driver expects that the setting has been programmed into the scanner externally, and that the data will be coming in with the specified Code ID attached.
Barcode Manipulation 143 Barcode – Symbology Settings The Symbology selected in the Symbologies dialog defines the symbology for which the data is being configured. The features available on the Symbology Settings dialog include the ability to individually enable or disable a barcode from scanning, set the minimum and maximum size barcode to accept, strip Code ID, strip data from the beginning or end of a barcode, or (based on configurable Barcode Data) add a prefix or suffix to a barcode.
144 Barcode Manipulation Parameters Enable This checkbox enables (checked) or disables (unchecked) the symbology field. The scanner driver searches the beginning of the barcode data for the type of ID specified in the Barcode tab – Enable Code ID field (AIM or Symbol) plus any custom identifiers. When a code ID match is found as the scanner driver processes incoming barcode data, if the symbology is disabled, the barcode is rejected.
Barcode Manipulation 145 Strip Leading/Trailing Control This group of controls determines what data is removed from the barcode before the data is buffered for the application. If all values are set, Code ID takes precedence over Leading and Trailing; Barcode Data stripping is performed last. Stripping occurs before the Prefix and Suffix are added, so does not affect them. See Also: Barcode Processing Overview earlier in this chapter.
146 Barcode Manipulation Barcode Data Match List Barcode Data This panel is used to strip data that matches the entry in the Match list from the barcode. Enter the data to be stripped in the text box and tap the Insert or Add button. The entry is added to the Match list. To remove an entry from the Match list, highlight the entry in the list and tap the Remove button. Tap the OK button to store any additions, deletions or changes.
Barcode Manipulation 147 Match List Rules The data in the list is processed by the rules listed below: • Strings in the list will be searched in the order they appear in the list. If the list contains ABC and AB, in that order, incoming data with ABC will match first, and the AB will have no effect. • When a match between the first characters of the barcode and a string from the list is found, that string is stripped from the barcode data.
148 Barcode Manipulation Add Prefix/Suffix Control See Also: Barcode Processing Overview earlier in this chapter. Figure 4-9 Add Prefix/Suffix Controls Use this option to specify a string of text, hex values or hat encoded values to be added to the beginning (prefix) or the end (suffix) of the barcode data. Up to 19 characters can be included in the string. The string can include any character from the keyboard plus characters specified by hex equivalent or entering in hat encoding.
Barcode Manipulation 149 Barcode – Ctrl Char Mapping See Also: Barcode Processing Overview earlier in this chapter. The Ctrl Char Mapping button activates a dialog to define the operations the LXE Wedge performs on control characters (values less than 0x20) embedded in barcodes. Control characters can be replaced with user-defined text which can include hat encoded or hex encoded values. In key message mode, control characters can also be translated to their control code equivalent key sequences.
150 Barcode Manipulation Replacement The edit control where the user types the characters to be assigned as the replacement of the control character. Replacements for a control character are assigned by selecting the appropriate character from the Character drop down box, typing the replacement in the Replacement edit control (according to the formats defined above) and then selecting Assign. The assigned replacement is then added to the list box above the Assign button.
Barcode Manipulation 151 Figure 4-11 Barcode Tab – Custom Identifiers After adding, changing and removing items from the Custom IDs list, tap the OK button to save changes and return to the Barcode panel. Parameters Name text box Name is the descriptor that is used to identify the custom Code ID. Names must be unique from each other; however, the Name and ID Code may have the same value. Name is used in the Symbology drop down box to identify the custom Code ID in a user-friendly manner.
152 Barcode Manipulation Control Code Replacement Examples Configuration data Ignore(drop) Printable text Hat-encoded text Escaped hatencoded text Hex-encoded text Escaped hexencoded text MX3X Reference Guide Translation The control character is discarded from the barcode data, prefix and suffix Text is substituted for Control Character. The hat-encoded text is translated to the equivalent hex value. The hatencoding to pass thru to the application.
Barcode Manipulation 153 Barcode Processing Examples The following table shows examples of stripping and prefix/suffix configurations. The examples assume that the scanner is configured to transmit an AIM identifier.
154 Advanced Advanced Access: Start | Settings | Control Panel | Scanner If your scanner applet has a “Barcode” tab instead of an “Advanced” tab, please see section titled “Barcode Manipulation” at the beginning of this chapter.
Advanced 155 Main Tab Note: Scanner control panel options are based on the installed software version levels, driver and OS versions in MX3X devices. Your Scanner options may or may not be as described in this section. Contact your LXE representative to obtain current software and drivers for your mobile device. Figure 4-12 Advanced – Main Tab Parameter Default Options Port 1 Internal Disabled, COM1, COM3, Internal, Cradle, Bluetooth, Output Enable.
156 Advanced Keys Tab Note: Scanner control panel options are based on the installed software version levels, driver and OS versions in MX3X devices. Your Scanner options may or may not be as described in this section. Contact your LXE representative to obtain current software and drivers for your mobile device.
Advanced 157 COM1, COM2, COM3 Tabs Do not connect a tethered scanner to the USB labelled ports: COM Default Options COM1 19200, 8 data bits, 1 stop bit, no parity Baud Rate – 115200 (115200 - RFID only), 38400, 19200, 9600, 4800, 2400, 1200 Power on pin 9 (+5v) Enabled Data Bits – 8, 7 Stop Bits – 1, 2 Parity – None, Odd, Even, Mark, Space COM2 9600, 8 data bits, 1 stop bit, no parity Baud Rate – 38400, 19200, 9600, 4800, 2400, 1200 Power on pin 9 (+5v) Disabled Data Bits – 8, 7 Stop Bits – 1
158 Advanced Advanced Tab Note: Scanner control panel options are based on the installed software version levels, driver and OS versions in MX3X devices. Your Scanner options may or may not be as described in this section. Contact your LXE representative to obtain current software and drivers for your mobile device.
Advanced 159 disabled), the edit controls are disabled; however the last specified number of characters to strip is retained and dimmed. When the number of characters to be stripped is greater than the number of characters in the barcode a good read beep is sounded but all barcode data is discarded.
160 Advanced Barcode Tab Access: Start | Settings | Control Panel | Scanner | Barcode tab Figure 4-16 Barcode Tab Prefix / Suffix Note: Prefix / Suffix is only available when Use Advanced Barcode Processing is disabled. Figure 4-17 Barcode – Prefix / Suffix Prefix/Suffix (and pre-existing data) is unavailable when Use Advanced Barcode Processing is enabled.
Advanced 161 The maximum number of characters that can be stripped is 99 characters for each leading and trailing number of characters. When the Strip Leading and Strip Trailing checkboxes are blank (or disabled), the edit controls are disabled; however the last specified number of characters to strip is retained and dimmed. When the number of characters to be stripped is greater than the number of characters in the barcode a good read beep is sounded but all barcode data is discarded.
162 Advanced Interaction between Strip Leading/Trailing and Prefix/Suffix Settings 1. Replacements are not done on the Prefix and Suffix, only the barcode data, for both Block and Key Message mode. Control characters in the Prefix and Suffix are translated when Translate All is enabled. 2. Replacements are done on the barcode data and then characters are stripped for both Strip Leading and Strip Trailing features.
Advanced 163 Ctrl Char Mapping Access: Start | Settings | Control Panel | Scanner | Barcode tab Figure 4-18 Barcode – Ctrl Translation Note that Control Character Mapping is available regardless of the status of the Use Advanced Barcode Processing checkbox. See “Hat Encoding” and “Decimal-Hexadecimal Chart” at the end of Appendix B “Technical Specifications”.
164 Advanced Character This is a drop down combo box that contains the control character name. Refer to the table in “Assigned Replacements” for the list of control characters and their names. When a character name is selected from the combo box, the text ‘Ignore (drop)’ is shown and highlighted in the Replacement edit control. ‘Ignore (drop)’ is highlighted so the user can type a replacement if the control character is not being ignored.
Advanced 165 Advanced Processing Access: Start | Settings | Control Panel | Scanner | Barcode tab Note that the Use Advanced Barcode Processing checkbox must be enabled before Advanced Processing can occur. See Also: The “Integrated Scanner Programming Guide”, section titled “Data Options” for full details on AIM Code IDs and Symbol Code IDs. Figure 4-20 Barcode – Advanced Processing No Code ID Default. All symbology IDs are transmitted.
166 Advanced Strip Code ID Enabling this parameter removes the number of characters (specified by AIM Code ID or Symbol Code ID radio button setting) before the barcode is sent to the application. Figure 4-21 Barcode – Advanced Processing – Strip Code ID This checkbox is unavailable when Data includes no Code ID radio button is enabled. Strip Identifiers from EAN128 Barcodes When Strip Code ID is disabled (unchecked), the AIM Code or Symbol Code ID is included in the barcode data being matched.
Advanced 167 Adding Codes to the Match List for EAN128 Barcodes The first elements of an EAN128 barcode are matched against the entries in the Match Code list, in the order entered in the list. For example, if the match code list contains Item 0 ABC, Item 1 C and Item 2 AB in that order, the AB has no effect. When a match is found (e.g. Code ID A was matched by Item 0 ABC and the process terminated) or when the end of the list is reached, processing terminates.
168 MX3X Reference Guide Advanced E-EQ-MX3XRG-H
Chapter 5 Wireless Network Configuration Introduction The MX3X mobile device offers a choice of Cisco, Symbol and Summit clients. The Summit client device is an 802.11g network card. The Cisco and Symbol client network cards are 802.11b clients. They can be configured for the security types listed below. Certificates are necessary for many of the WPA authentications. Please refer to the “Certificates” section at the end of this chapter for more information on generating and installing certificates.
170 Summit Client Configuration Summit Client Configuration The Summit client requires driver 1.2.1 SCU 1.2.4 or later. All MX3X’s with a Summit wireless device ship with this software revision or greater. To identify the software version, tap the “About” icon in Start | Settings | Control Panel. Summit Client Utility Icon Start the Summit Client configuration by tapping the Summit Client Utility icon on the desktop. You can also start the Summit Client utility by tapping Start | Programs | Summit | SCU.
Summit Client Configuration 171 Summit Tray Icon The Summit tray icon provides access to the SCU and is a visual indicator of link status. The Summit tray icon is displayed when: • The Summit radio is installed and active. • The Windows Zero Config utility is not active. • The Tray Icon setting is On. Tap the icon to launch the Summit Configuration Utility. Use the tray icon to view the link status: Summit client is not currently associated or authenticated to an Access Point.
172 Summit Client Configuration Main Tab Factory Default Settings Admin Login Radio Active Config SUMMIT Enabled Default Figure 5-2 SCU – Main Tab The Main tab displays information about the client device including: • SCU (Summit Client Utility) version • Driver version • Regulatory Domain • Copyright Info • Active Config • Status of the network device (Down, Associated, Authenticated, etc). The Active Config (profile) can be switched without logging in to Administrator mode.
Summit Client Configuration 173 Administrator Login To login to Administrator mode, tap the Admin login button. Once logged in, the button label changes to Admin Logout. The admin is automatically logged out when the SCU is exited. The Admin can either tap the Admin Logout button, or a navigation button (X or OK), to logout. The Administrator remains logged in when the SCU is not closed and a Suspend/Resume function is performed.
174 Summit Client Configuration Config Tab Note: Tap the Commit button to save changes before leaving this panel or the SCU.
Summit Client Configuration Note: 175 Unsaved Changes -- Newer versions of the SCU display a reminder if the Commit button is not clicked before an attempt is made to close or browse away from the Config tab. IMPORTANT – The settings for Auth Type, EAP Type and Encryption depend on the security type chosen. Please refer to “Wireless Security” later in this Summit Client Utility section to determine the proper settings for the security type implemented on the wireless LAN.
176 Summit Client Configuration Parameter Default Explanation EAP Type None Extensible Authentication Protocol (EAP) type used for 802.1x authentication to the Access Point. Options are: None, LEAP, EAP-FAST, PEAP-MSCHAP, or PEAP-GTC. Note: EAP Type chosen determines whether the Credentials button is active and also determines the available entries in the Credentials pop-up window. Encryption None Type of encryption to be used to protect transmitted data.
Summit Client Configuration 177 Status Tab Figure 5-5 SCU – Status Tab This screen displays information on the current profile and network connection. Information cannot be edited or changed on the Status panel. The panel displays: Note: E-EQ-MX3XRG-H • The config profile being used • The client name, IP address and MAC address • The status of the network connection (down, associated, authenticated, etc.
178 Summit Client Configuration Diags Tab The Diags panel can be used for troubleshooting network traffic and wireless connectivity issues for the IP address shown above the Release/Renew button. Administrator login is required for the (Re)connect button function. Note: Diagnostics and Site Survey functions are not available in this release.
Summit Client Configuration 179 Global Settings Tab The parameters on the Global Settings panel can only be changed when an Administrator is logged in. No password is required to view the parameter settings. Note: Tap the Commit button to save changes.
180 Summit Client Configuration Parameter Default Function TX Diversity On How to handle antenna diversity when transmitting packets to the Access Point. Options are: Main only (use the main antenna only), Aux only (use the auxiliary antenna only), or On (use diversity or both antennas). Preamble Auto The type of client header, or preamble, for packets. Options are: Auto, Short, or Long. G Short Slot Auto 802.1x short slot timing mode. Options are: Auto, On, or Off.
Summit Client Configuration 181 Parameter Default Function Ping Timeout ms 5000 The amount of time, in milliseconds, that a device will be continuously pinged. The Stop Ping button can be tapped to end the ping process ahead of the ping timeout. Options are: Any number between 0 and 30000 ms. Ping Delay ms 1000 The amount of time, in milliseconds, between each ping after a Start Ping button tap. Options are: Any number between 0 and 30000 ms.
182 Summit Client Configuration Summit Wireless Security Use the instructions in this section to complete the entries on the Config tab according to the type of wireless security used by your network. The instructions that follow are the minimum required to successfully connect to a network. Your system may require more parameters than are listed in these instructions. Please see your System Administrator for complete information about your network and its wireless security requirements.
Summit Client Configuration 183 No Security Start the Summit Utility by tapping the Summit Client icon. Tap the Admin Login button on the Main panel. Enter the Administrator password and tap OK. Tap the Config tab. Figure 5-9 Summit Profile with No Security Enter the SSID of the Access Point assigned to this profile. Set Auth Type to Open. Set EAP Type to None. Set Encryption to None. Tap the Commit button 5 to save the new profile configuration.
184 Summit Client Configuration WEP Keys Please see your System Administrator for complete information about your network WEP key requirements. To connect using WEP, use the following minimum required profile options.. • Auth Type = Open • EAP Type = None • Encryption = Manual WEP Tap the WEP/PSK Keys button. The WEP Key Entry text entry box appears. Figure 5-10 Summit WEP Keys Enter the WEP key. If there are more than one set of keys, tap the radio button in front of the Key to be used.
Summit Client Configuration 185 LEAP w/o WPA Authentication If the Cisco/CCX certified AP is configured for open authentication, set the Auth Type client parameter to “Open”. If the AP is configured for network EAP only, set the Auth Type client parameter to “LEAP”. Start the Summit Utility by tapping the Summit Client icon. Tap the Admin Login button on the Main panel. Enter the Administrator password and tap OK. Tap the Config tab.
186 Summit Client Configuration EAP-FAST Authentication Start the Summit Utility by tapping the Summit Client icon. Tap the Admin Login button on the Main panel. Enter the Administrator password and tap OK. Tap the Config tab. Figure 5-13 Summit Profile for EAP-FAST Enter the SSID of the Access Point assigned to this profile. Set Auth Type to Open. Set EAP Type to EAP-FAST. Set Encryption to WPA TKIP. The SCU only supports EAP-FAST with automatic PAC provisioning.
Summit Client Configuration 187 PEAP/MSCHAP Authentication Start the Summit Utility by tapping the Summit Client icon. Tap the Admin Login button on the Main panel. Enter the Administrator password and tap OK. Tap the Config tab. Figure 5-15 Summit Profile for PEAP/MSCHAP Enter the SSID of the Access Point assigned to this profile. Set Auth Type to Open. Set EAP Type to PEAP-MSCHAP. Set Encryption to Auto WEP (without WPA). To configure PEAP-MSCHAP for WPA set Encryption to WPA TKIP.
188 Summit Client Configuration Figure 5-16 Summit PEAP/MSCHAP Credentials Once successfully authenticated, copy the CA certificate into the \System directory of the device. Once the file is in the \System directory, enter the file name in the CA Certificate Filename text box. Tap OK then tap the Commit button. Perform a warm reset function. 6 The device should be authenticating the server certificate and using PEAP/MSCHAP for the user authentication.
Summit Client Configuration 189 WPA/LEAP Authentication Start the Summit Utility by tapping the Summit Client icon. Tap the Admin Login button on the Main panel. Enter the Administrator password and tap OK. Tap the Config tab. Figure 5-17 Summit Profile with LEAP for WPA TKIP To use Stored Credentials, tap the Credentials button. Note: No entries are necessary for Sign-On Credentials as the user will be prompted for the User name and Password when connecting to the network.
190 Summit Client Configuration WPA PSK Authentication Start the Summit Utility by tapping the Summit Client icon. Tap the Admin Login button on the Main panel. Enter the Administrator password and tap OK. Tap the Config tab. Figure 5-19 Summit Profile with WPA/PSK Encryption Enter the SSID of the Access Point assigned to this profile. Set Auth Type to Open. Set EAP Type to None. Set Encryption to WPA PSK. Tap the WEP/PSK Keys button.
Summit Client Configuration 191 PEAP/GTC Authentication Start the Summit Utility by tapping the Summit Client icon. Tap the Admin Login button on the main panel. Enter the Administrator password and tap OK. Tap the Config tab. Figure 5-21 Configure a Summit Profile with PEAP/GTC Enter the SSID of the Access Point assigned to this profile. Set Auth Type to Open. Set EAP Type to PEAP-GTC. Set Encryption to WPA TKIP. To use Stored Credentials, tap the Credentials button.
192 Cisco Client Configuration Cisco Client Configuration Prerequisites • Network SSID or ESSID number of the Access Point • WEP or LEAP Authentication Protocol Keys Aironet Client Utility (ACU) Access: Note: Start | Aironet Client Utility or ACU Icon on Desktop When making changes to profile parameters, the mobile device should be warmbooted afterwards. Cisco options are available on the MX3X and MX3-RFID devices.
Cisco Client Configuration 193 Profile Parameters Use this option to manage profiles and review firmware information, status, statistics and wireless device survey data. Profile Parameter SSID Client Name Infrastructure Mode Power Save Mode Network Security Type WEP Authentication Types LEAP Mixed Mode World Mode Data Rates Transmit Power Offline Channel Scan Default Blank Blank Yes Fast PSP None No WEP Open Disabled Disabled Disabled Auto MAX Enabled Select an active profile to manage.
194 Cisco Client Configuration Cisco Wireless Security Wi-Fi Protected Access (WPA) is only available on mobile device’s equipped with the updated Cisco client driver (release 2.60 or later). WPA requires software revision 1ED or greater. To identify the software revision, please tap the “About” icon in the Control Panel. Please refer to the “LXE Security Primer” to prepare the Authentication Server and Access Point for Cisco client communication. It is important that all dates are correct on the .
Cisco Client Configuration 195 Checking for the Cisco PEAP Supplicant With a Cisco client installed, open the Wireless network properties as described in “Cisco Configuration”, later in this section. With the Authentication tab selected check the text in the EAP type drop down box. Refer to the following figures to determine if Cisco PEAP is installed. Figure 5-25 No Cisco PEAP Figure 5-26 Cisco PEAP Installed If the Cisco installation is correct, continue with the configuration.
196 Cisco Client Configuration Cisco WPA Configuration Use the following instructions for all authentication protocols to configure the Microsoft Wireless Network configuration utility unless WPA/LEAP is used. WPA/LEAP is configured with the Cisco ACU (see Section titled “WPA/LEAP Authentication Configuration”). Tap the ACU icon on the desktop. Figure 5-27 Cisco ACU Profile Selection From the Select Active Profile pull down list, select . Tap OK and warmboot.
Cisco Client Configuration 197 The Wireless Network Connection screen appears. Figure 5-30 Wireless Information Screen Make sure the “Notify me when new wireless networks are available” box is not checked.. Tap the Advanced… button. Figure 5-31 Advanced Wireless Settings Make sure the “Use Windows to configure my wireless settings” box is checked. Set the “Networks to access” drop down box to “Only access points”.
198 Cisco Client Configuration On the Wireless Information screen tap the Add New … line. The Wireless Network Properties screen is displayed. Figure 5-32 Wireless Network Properties Enter the Network name (SSID) into the text field. For PEAP/MSCHAP and EAP/TLS, set Encryption to TKIP and Authentication to WPA. For WPA/PSK see “WPA/PSK Authentication Configuration”. To configure the IEEE 802.1X Authentication box see the following sections for configuration of each authentication protocol.
Cisco Client Configuration 199 PEAP/MS-CHAP Authentication Configuration The Microsoft supplicant authenticates a user with the PEAP/MS-CHAP protocol. The Cisco CAB file without Cisco PEAP must be used with PEAP/MS-CHAP. See “Installing Client Device Drivers”, earlier in this chapter, for more information. Configuring the PEAP/MS-CHAP Supplicant Figure 5-33 PEAP/MSCHAP Wireless Network Properties With the client parameters configured set the EAP type to PEAP as shown above.
200 Cisco Client Configuration The login screen appears for logging into the wireless network. Figure 5-35 Wireless Network Login Once authenticated, tap the IP Information tab. Figure 5-36 IP Information Tab If the network is set to use DHCP, the mobile device displays the IP address assigned by the DHCP server. Now go back and authenticate the server. Server Authentication To validate the server certificate install the root CA certificate.
Cisco Client Configuration 201 Navigate to the Wireless Network Properties configuration screen. Tap the Properties button. Check “Validate server” . Tap OK to dismiss the configuration boxes. Figure 5-38 Advanced Wireless Settings, Authenticated SSID Once the authentication completes, the status changes to show the mobile device has authenticated to the , as shown in the figure above.
202 Cisco Client Configuration PEAP/GTC Authentication Configuration The Microsoft supplicant authenticates a user with the PEAP/GTC protocol. Configuring the PEAP/GTC Supplicant With the client parameters configured set the EAP type to Cisco PEAP as shown below. Figure 5-39 PEAP/GTC Wireless Network Properties If the EAP type box text is not exactly as shown see “Installing Client Device Drivers”, earlier in this chapter, to change the client CAB file. Click the Properties button.
Cisco Client Configuration 203 The login screen appears for logging into the wireless network. Figure 5-41 Login Screen Enter valid user credentials. Once authenticated tap the IP Information tab Figure 5-42 IP Information Tab The .NET device displays the IP address given by the DHCP server. Now go back and authenticate the server.
204 Cisco Client Configuration Server Authentication To validate the server certificate install the root CA certificate. For instructions for installing, see “Root Certificates”, earlier in this chapter. Figure 5-43 Authentication Settings, Validate Server Navigate to the Wireless Network Properties configuration screen. Tap the Properties button. Check Validate server . Tap OK to dismiss the configuration boxes.
Cisco Client Configuration 205 WPA/LEAP LEAP is a Cisco proprietary authentication protocol and is not supported by the Microsoft supplicant. To configure the mobile device for WPA/LEAP, use the Cisco ACU installed during normal installation of the Cisco client driver. Cisco ACU Start the Cisco ACU by tapping the icon on the desktop or navigate to Start | Programs | Cisco | ACU. Tap the Profile tab. Figure 5-45 WPA/LEAP using ACU Profile Tab Tap the Rename button. Name the profile.
206 Cisco Client Configuration The profile properties screen is displayed. Figure 5-47 Profile Properties Screen Enter the SSID and Client Name in the correct fields. Set the Network Security Type to LEAP(WPA). Tap the OK button. Figure 5-48 Select Profile Use the drop down box to choose the profile just configured. Tap OK.
Cisco Client Configuration 207 The mobile device associates and displays the sign on screen. Figure 5-49 Login Screen Tap the Status tab to display status.
208 Cisco Client Configuration EAP-TLS Authentication Configuration To authenticate using the EAP-TLS protocol you need a user certificate file and a private key file. Once you have the user certificate files run the certificate installer from the Microsoft control panel. For EAP-TLS it does not matter which Cisco cab file is installed. Note: It is important that all dates are correct on the .NET computers when using any type of certificate.
Cisco Client Configuration 209 If there is no user certificate refer to “User Certificates”, earlier in this chapter, to acquire a user certificate and private key file. Setting EAP/TLS Parameters With the client parameters configured set the EAP type to TLS as shown. Figure 5-53 EAP/TLS Configuration Tap the Properties button. Figure 5-54 Authentication Settings Tap the Select button to choose the user certificate.
210 Cisco Client Configuration Figure 5-55 Select Certificate Figure 5-56 Authentication Settings, Certificate Details Do not check the Validate server certificate box. This allows the user to be authenticated as the first step. When the user certificate successfully authenticates, come back to this screen and validate the server certificate as described in the next section. Tap the OK button to dismiss the configuration screens.
Cisco Client Configuration 211 Validating the Server Certificate Before validating the server certificate, make sure the Root CA certificate is installed on the mobile device. Navigate to the Wireless Network Properties configuration screen. Tap the Properties button. Check the Validate server box as shown below. Figure 5-57 Validate Server Tap OK to dismiss the configuration boxes.
212 Cisco Client Configuration WPA PSK Configuration Figure 5-59 WPA PSK Configuration Configure the Wireless Network Settings as described in “Wireless Security”, earlier in this chapter. Change the Network Authentication to WPA-PSK. Enter an ASCII network key in the text field. Hex keys do not work in the Microsoft Zero Config utility at this time. There is no server authentication when using WPA-PSK. Tap the OK button to complete the configuration.
Symbol Client Configuration 213 Symbol Client Configuration Prerequisites • Network SSID or ESSID number of the Access Point • WEP or LEAP Authentication Protocol Keys Note: When making changes to profile parameters, the mobile device should be warmbooted afterwards unless noted otherwise. Symbol options are available on an MX3X device only.
214 Symbol Client Configuration Wireless Information Tab Factory Default Settings Wireless Information Notify when new networks available Advanced Button Use Windows to configure wireless settings Automatically connect to non-preferred networks Networks to access (Only APs, Only comp-to-comp) Encryption (WEP, TKIP) Authentication (WPA, Open, Shared, WPA-PSK) Ad hoc network Key provided automatically Enable 802.
Symbol Client Configuration 215 Disable WEP • If WEP is to be disabled, tap the down arrow in the Authentication drop down box. Select Open. • Tap the down arrow in the Encryption drop down box. Tap Disabled and WEP is disabled. • Tap the OK button to return to the Wireless Information tab. Enable WEP • Tap the down arrow in the Authentication drop down box. • Tap the WEP Authentication protocol. • If the key is provided automatically by your network, check the “Key provided automatically” checkbox.
216 Symbol Client Configuration Select a User Certificate 1. Select Wireless Information Tab 2. Select a network by doubletapping the network name. 3. In the IEEE 802.1X Authentication box, enable 802.1X authentication 4. Select an EAP type. 5. Tap the Properties button. Validate Server is enabled by default. 6. At the Authentication Settings display, tap the Select button to choose a User Certificate.
Certificates 217 Certificates It is important that all dates are correct on the .NET computers when using any type of certificate. Certificates are date sensitive and if the date is not correct authentication will fail. Root Certificates Generating a Root CA Certificate Please refer to the “LXE Security Primer” for more information on obtaining and installing root certificates.
218 Certificates Make sure the correct root CA certificate is selected in the list box. Figure 5-66 Download CA Certificate Screen Click the DER button. To download the CA certificate, click on the Download CA certificate link. Figure 5-67 Download CA Certificate Screen Click the Save button and save the certificate to the desktop PC. Keep track of the name and location of the certificate as the certificate file name and file location is required in later steps.
Certificates 219 Installing a Root CA Certificate on the Mobile Device Copy the certificate file from the desktop PC to the mobile device. Import the certificate by navigating to Start | Control Panel | Certificates. Figure 5-68 Certificates Tap the “Import” button. Figure 5-69 Import Certificate Make sure “From a File” is selected and tap OK.
220 Certificates Figure 5-70 Browsing to Certificate Location Using the Explorer buttons, browse to the location where you copied the certificate, select the certificate desired and tap OK. Figure 5-71 Certificate Import Confirmation Tap Yes to import the certificate. Once the certificate is installed, return to the proper authentication section, described later in this chapter.
Certificates 221 User Certificates It is important that all dates are correct on the .NET computers when using any type of certificate. Certificates are date sensitive and if the date is not correct authentication will fail. Generating a User Certificate for the MX3X Please refer to the “LXE Security Primer” for more information on obtaining and installing user certificates. The easiest way to get the user certificate is to use a browser on a PC to navigate to the CA.
222 Certificates Figure 5-74 Request a Certificate Screen Click on the “advanced certificate request” link. Figure 5-75 Advanced Certificate Request Screen Click on the “Create and submit a request to this CA” link.
Certificates 223 Figure 5-76 Advanced Certificate Details For the Certificate Template, select “User”. Check the “Mark keys as exportable” and the “Export keys to file” checkboxes. Type the full path on the local PC where the private key is to be copied. Also specify the private key filename. ! Be sure to note the name used for the private key file, for example MX3XUSER.PVK. The certificate file created later in this process must be given the same name, for example, MX3XUSER.CER.
224 Certificates Figure 5-77 Script Warnings If any script notifications occur, click the “Yes” button to continue the certificate request. Figure 5-78 Script Warnings When prompted for the private key password: • Click “None” if you do not wish to use a password, or • Enter and confirm your desired password then click “OK”. Figure 5-79 Certificate Issued Click the Download certificate link.
Certificates 225 Figure 5-80 Download Security Warning Click Save to download and store the user certificate to the PC. Keep track of the name and location of the certificate as the file name and location is required in later steps. The private key file is also downloaded and saved during this process. ! E-EQ-MX3XRG-H Be sure use the same name for the certificate file as was used for the private key file. For example, it the private key was saved as MX3XUSER.
226 Certificates Installing a User Certificate on the MX3X (WPA-TLS Only) Copy the certificate and private key files to the mobile device. Import the certificate by navigating to Start | Control Panel | Certificates. Select “My Certificates” from the pull down list. Figure 5-81 Certificates Click the “Import” button. Figure 5-82 Import Certificate Make sure “From a File” is selected and click OK.
Certificates 227 Figure 5-83 Browsing to Certificate Location Using the explorer buttons, browse to the location where you copied the certificate, select the certificate desired and tap OK. The certificate is now shown in the list. Figure 5-84 Certificate Listing Highlight the certificate you just imported and tap the View. . button. From the Field pull down menu, select “Private Key. Figure 5-85 Private Key Not Present E-EQ-MX3XRG-H • If the private key is present, the process is complete.
228 Certificates To import the private key, tap OK to return to the Certificates screen. Tap import. Figure 5-86 Browsing to Private Key Location Using the explorer buttons, browse to the location where you copied the private key file, change the Type pull down list to “Private Keys”, select the certificate desired and tap OK. Enter the password for the certificate if appropriate. Tap View to see the certificate details again. Figure 5-87 Private Key Present The private key should now say “Present”.
Chapter 6 AppLock Introduction Note: LXE has made the assumption, in this chapter, that the first user to power up a new mobile device is the system administrator. LXE’s AppLock is designed to be run on LXE certified Windows CE based devices only. LXE loads the AppLock program as part of the LXE customer installation process. Configuration parameters are specified by the AppLock Administrator for the mobile device enduser. AppLock is password protected by the Administrator.
230 Setup a New Device Multi-Application Version Access: Start | Settings | Control Panel | Administration icon A mobile device running the Multi-Application version of AppLock becomes a dedicated, multiple application device. Only the applications or features specified in the AppLock configuration by the Administrator are available to the end-user. This version offers a user-mode taskbar icon allowing the end-user to switch between user applications.
Setup a New Device 231 Single Application Version Access: Start | Settings | Control Panel | Administration icon A mobile device running the Single Application version of AppLock becomes a dedicated, single application device. In other words, only the application or feature specified in the AppLock configuration by the Administrator is available to the user. See section titled Single Application Configuration for information and instruction.
232 Administration Mode Administration Mode Administration mode gives full access to the mobile device, hardware and software configuration options. The administrator must enter a valid password (when a password has already been assigned) before access to Administration mode and configuration options are allowed. The administrator can configure the following options: 1. Create/change the keystroke sequence to activate administrator access. 2. Create/change the password for administrator access. 3.
Passwords 233 Passwords A password must be configured. If the password is not configured, a new device switches into Administration mode without prompting for a password. In addition to the hotkey press, a mode switch occurs if inaccurate information has been configured or if mandatory information is missing in the configuration. There are several situations that display a password prompt after a password has been configured. If the configured hotkey is pressed, the password prompt is displayed.
234 Multi-Application Configuration Multi-Application Configuration The default Administrator Hotkey sequence is Shift+Ctrl+A. Administrator mode allows access to all features on the device. When the hotkey is pressed to switch into Administrator mode, a password prompt is displayed (if a password has been configured).
Multi-Application Configuration 235 Enter the Order in which the application is to be loaded or presented to the end user. Applications are launched in lowest to highest number order. Enable the Internet checkbox to use the End User Internet Explorer (EUIE.EXE) When the checkbox is enabled, the Internet Menu and Internet Status are available. See the section titled End User Internet Explorer for more details. Select the Global Key key sequence the end user is to press when switching between applications.
236 Multi-Application Configuration Security Panel Figure 6-4 Security Panel – Multi-Application Hotkey Specify the hotkey sequence that triggers AppLock to switch between administrator and user modes and the password required to enter Administrator mode. The default hotkey sequence is Shift+Ctrl+A. A 2nd key keypress is an invalid keypress for a hotkey sequence. Move the cursor to the Hot Key text box. Enter the new hot key sequence by first pressing the Shift state key followed by a normal key.
Multi-Application Configuration 237 Password Move the cursor to the Password text box. The passwords entered in the Password and Confirm Password fields must match. Passwords are case sensitive. When the user exits the Administrator Control panel, the two passwords are compared to verify that they match. If they do not match, a dialog box is displayed notifying the user of the error.
238 Multi-Application Configuration Log Note: If a level higher than Error is selected, the status should be cleared frequently by the administrator. In addition to the three view levels the administrator can select that all status information be logged or turn off all status information logging completely. The system default is ‘None’; however to reduce registry use, the administrator may want to select ‘None’ after verifying the configuration.
Multi-Application Configuration 239 End-User Switching Technique Figure 6-6 End-User Multi-Application Touch Panel Using a Stylus Tap When the mobile device enters end-user mode, a taskbar icon is available to the user so they can switch between the locked applications. The touch screen must be enabled on the mobile device before the taskbar icon can be used. The taskbar is always visible on top of the application in focus.
240 Multi-Application Configuration Troubleshooting Multi-Application AppLock The mobile device won’t switch from Administration mode to end-user mode. • If the configuration is valid for one application but not the other, the switch to end-user mode fails. AppLock stays in Administration mode and is stopped until the Administrator password is entered.
Single Application Configuration 241 Single Application Configuration The default Administrator Hotkey sequence is Shift+Ctrl+A. Administrator mode allows access to all features on the device. When the hotkey is pressed to switch into Administrator mode, a password prompt is displayed (if a password has been configured).
242 Single Application Configuration End User Internet Explorer AppLock supports applications that utilize Internet Explorer, such as .HTML pages and JAVA applications. The end user can run an application by entering the application name and path in Internet Explorer’s address bar. To prevent the end user from executing an application using this method, the address bar and Options settings dialog are restricted in Internet Explorer.
Single Application Configuration 243 For example, if the ‘Ctrl’ key is pressed followed by ‘A’, “Ctrl+A” is entered in the text box. If another key is pressed after a normal key press, the hotkey sequence is cleared and a new hotkey sequence is started. A normal key is required for the hotkey sequence and unlike pressing the normal key during a mode switch; this key can be entered from the SIP when configuring the key.
244 Single Application Configuration Status Panel Administrator Control Control View Level: Security Status Refresh Log Level: Clear Save As... Figure 6-9 Administrator Status Panel Use the Status panel to view the log of previous AppLock operation and to configure which messages are to be recorded during AppLock operation.
Error Messages 245 Save As When the 'Save As'… button is selected, a standard 'Save As' dialog screen is displayed. Specify the path and filename. If the filename exists, the user is prompted whether the file should be overwritten. If the file does not exist, it is created. See Also: Error Messages Error Messages Any messages whose first word is an ‘ing’ word is output prior to the action described in the message.
246 Error Messages Message Explanation and/or corrective action Level Address of keyboard hook procedure OK Applock successfully retrieved the address of the keyboard filter initialization procedure. LOG_EX Alt pressed The Alt key has been pressed and trapped by the HotKey processing. LOG_EX Alt Processing the hotkey and backdoor entry LOG_EX Application handle search failure The application being locked did not complete initialization.
Error Messages 247 Message Explanation and/or corrective action Level Decrypt failure Unable to decrypt password. LOG_ERROR Decrypt import key failure Unable to decrypt password. LOG_ERROR Decrypt imported key OK Decryption process ok. LOG_EX Encrypt acquire context failure Unable to encrypt password. LOG_ERROR Encrypt acquire encrypt context failure Unable to encrypt password. LOG_ERROR Encrypt acquired encrypt context OK Encrypt password process successful.
248 Error Messages Message Explanation and/or corrective action Level Enter EncryptPwd Entering the password encryption processing. LOG_PROCESSING Enter FullScreenMode Entering the function that switches the screen mode. In full screen mode, the taskbar is hidden and disabled. LOG_PROCESSING Enter GetAppInfo Processing is at the beginning of the function that retrieves the application information from the registry. LOG_PROCESSING Enter password dialog Entering the password dialog processing.
Error Messages 249 Message Explanation and/or corrective action Level Exit restart app timer Processing is at the end of the timer function LOG_PROCESSING Exit TaskbarScreenMode Exiting the function that switches the screen mode back to normal operation for the administrator. LOG_PROCESSING Exit ToAdmin Exiting the function that handles the mode switch into admin mode. LOG_PROCESSING Exit ToUser Exiting the user mode switch function.
250 Error Messages Message Explanation and/or corrective action Level In app hook:WM_SIZE In addition to preventing the locked application from exiting, AppLock must also prevent the application from enabling the taskbar and resizing the application’s window. This message traps a change in the window size and corrects it.
Error Messages 251 Message Explanation and/or corrective action Level Read registry failure-Internet The Internet registry entry is missing or empty. This is not considered an error since the Internet value is not necessary to launch and lock the application. LOG_ERROR Registering Backdoor MSG The AppLock system communicates with the keyboard hook via a user defined message. Both AppLock.exe and Kbdhook.dll register the message at initialization.
252 Error Messages Message Explanation and/or corrective action Level Switching to admin-keyboard hook initialization failure If the keyboard hook initialization fails, Applock switches to admin mode. . If a password is specified, the password prompt is displayed and remains until a valid password is entered. LOG_PROCESSING Switching to admin-registry read failure See the explanation of the “Registry read failure” above. AppLock is switching into Admin mode.
Error Messages 253 Message Explanation and/or corrective action Level Unhook wndproc failure AppLock could not remove the hook that allows monitoring of the application. LOG_ERROR Unhooking taskbar In administration mode, the taskbar should return to normal operation, so AppLock’s control of the taskbar should be removed. LOG_EX Unhooking wndproc When the administrator leaves user mode, the device is fully operational; therefore, AppLock must stop monitoring the locked application.
254 AppLock Registry Settings AppLock Registry Settings This system application runs at startup via the “launch” feature of LXE Windows CE .NET devices. When the launch feature is installed on the device, the following registry settings are created. The launch feature registry settings are embedded in the mobile device OS image: HKEY_LOCAL_MACHINE\\Software\\LXE\\Persist\\Filename=AppLock.
Appendix A Key Maps Keypad Note: The key mapping in this appendix relates to the physical keypad. See section titled “Input Panel” for the Virtual (or Soft) Keypad used with the stylus. Key Map 101-Key Equivalencies Note: This key mapping is used on hand held computers that are NOT running an LXE Terminal Emulator. When using a sequence of keys that includes the 2nd key, press the 2nd key first then the rest of the key sequence.
256 Key Maps To get this key Press These Keys and Then nd 2 Shift Ctrl Alt Press this key CapsLock Left Arrow Left Arrow Insert x BkSp Delete x DOT Home x Left Arrow End x Right Arrow Page Up x Up Arrow Page Down x Down Arrow ScrollLock x x F4 F1 F1 F2 F2 F3 F3 F4 F4 F5 F5 F6 F6 F7 F7 F8 F8 F9 F9 F10 F10 F11 x x F1 F12 x x F2 a Off A b Off B c Off C d Off D e Off E f Off F g Off G h Off H i Off I j Off J k Off K l
Key Maps 257 To get this key Press These Keys and Then nd 2 Shift Ctrl Alt Press this key CapsLock q Off Q r Off R s Off S t Off T u Off U v Off V w Off W x Off X y Off Y z Off Z A x A B x B C x C D x D E x E F x F G x G H x H I x I J x J K x K L x L M x M N x N O x O P x P Q x Q R x R S x S T x T U x U V x V W x W X x X Y x Y Z x Z E-EQ-MX3XRG-H MX3X Reference Guide
258 Key Maps To get this key Press These Keys and Then nd 2 Shift Ctrl Alt Press this key CapsLock 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 0 0 DOT DOT < x 0 [ x 1 ] x 2 > x 3 = x 4 { x 5 } x 6 / x 7 - x 8 + x 9 * x I : (colon) x D ; (semicolon) x F ? x L ` x N _ (underscore) x M , (comma) x J ‘ (apostrophe) x H ~ (tilde) x B \ x S | x A “ x G ! x Q @ x W # x E MX3X Reference Guide E-EQ-MX3XRG-H
Key Maps 259 To get this key Press These Keys and Then nd 2 Shift Ctrl Alt Press this key CapsLock $ x R % x T ^ x Y & x U ( x O ) x P 3270 Key Sequences Legend ........................Explanation......................... Key Sequence Attn ..............................Attention............................... Ctrl + A Clr ................................Clear ..................................... Ctrl + C Del ...............................Delete .................................
260 Key Maps Creating Custom Key Maps Prerequisite: Note: LXE SDK CD There may be different SDK kits for Windows CE .NET 4.2 and CE 5.0. Contact your LXE representative to order an LXE SDK CD for your MX3X. Introduction A command-line compiler called KEYCOMP.EXE is provided on the SDK CD.
Key Maps 261 • Second, the data parsed from the input file is validated to see that all of the items required by the keyboard driver for normal operation are present. • Third and finally, the KEYCOMP.REG file is written out in the format required by the REGLOAD utility on the Windows CE device. Programmable Scan Buttons and Custom Key Mapping The Left and Right Scan buttons can be reset using Custom Key Mapping. Custom keymapping changes the placement of the buttons (e.g., F1 can now be Scan Left).
262 Key Maps GENERAL Section The first section is the GENERAL section. This contains the keymap name (all numerics), as well as the number of rows and columns in the keymap, and the algorithm for converting rows and columns to a data byte to go into the keymap table. . [General] MAPNAME=0409 MAPCNT=4 . MAPNAME Name of this map. This is what appears in the popup menu in the keyboard control panel. MAPCNT Gives the number of MAP sections (and hence keymap tables) in this source file.
Key Maps 263 MAP Section . [Map] MAP=MAP_NORMAL ;;;;;;;;;;;;;;;;;;;;;;;;;;; COL0ROW0=VK_ESCAPE COL0ROW1=VK_F1 . There will be several (4 to 7) MAP sections, each defining the keymap for a given combination of modifier keys. The keyboard driver requires keymaps for normal (no modifiers), SHIFT only, 2ND only, and 2ND-SHIFT combined.
264 Key Maps Key codes are defined by COLxROWx=scancode. Scancode has a number of options, as follows: VK_code any valid Windows VK code (see below for valid codes) 'x' a single ASCII character ('A','b','1','@',' ', etc.
Key Maps 265 Keycomp Error Messages Most error messages will specify the line within the keymap source file where the error occurred. Duplicate key A COLxROWx code was found in a MAP table, but that COL/ROW already has a value assigned. GENERAL section must come before MAP The GENERAL section must come first, or at least before any MAP sections.
266 Key Maps Invalid scan code The scan code parsed is not recognized. The scan code can take one of the following formats: • • • • • • • VK_code 'x' SHIFT+VK_code SHIFT+'x' ACTION+code CHANGE+mapname OPEN Invalid section name %s The section name parsed is invalid. The only recognized names are: GENERAL, SPECIAL, or MAP Invalid SHIFT code %s The key scan code is specified as SHIFT+code, but the SHIFT code parsed is not recognized.
Key Maps 267 No definition for map MAP_2ND There is no 2nd keymap defined. The keyboard driver requires this keymap to be defined. This message comes from the post-parse validation, so no line # is specified. No definition for map MAP_2NDSHIFT There is no 2nd-SHIFT keymap defined. The keyboard driver requires this keymap to be defined. This message comes from the post-parse validation, so no line # is specified. No definition for map MAP_NORMAL There is no Normal keymap defined.
268 Key Maps No definition for MapHead.keyscan2 No Scan Key 2 definition was found. The keyboard driver requires this key to be defined somewhere in one of the keymaps. This message comes from the post-parse validation, so no line # is specified. No definition for MapHead.keyscan3 No Trigger Button definition was found. The keyboard driver requires this key to be defined somewhere in one of the keymaps. This message comes from the post-parse validation, so no line # is specified. No definition for MapHead.
Key Maps 269 Sample Input File ;;---------------------------------------------------;; keymap file for MX3X default keyboard ;;---------------------------------------------------;;---------------------------------------------------;; general parms give the size of arrays ;; all numeric values are decimal ;; these numbers are validated with the data below ;; at compile time ;; MAPNAME must be all numerics ;;---------------------------------------------------[General] MAPNAME=0409 MAPCNT=4 MAPCOLS=8 MAPROWS
270 Key Maps COL1ROW7=ACTION+SCAN2 ;;;;;;;;;;;;;;;;;;;;;;;;;;; COL2ROW0='A' COL2ROW1=open COL2ROW2='D' COL2ROW3='G' COL2ROW4='J' COL2ROW5='1' COL2ROW6='L' COL2ROW7='3' ;;;;;;;;;;;;;;;;;;;;;;;;;;; COL3ROW0=' ' COL3ROW1=open COL3ROW2='X' COL3ROW3='V' COL3ROW4='N' COL3ROW5='0' COL3ROW6=VK_LEFT COL3ROW7=VK_TAB ;;;;;;;;;;;;;;;;;;;;;;;;;;; COL4ROW0=VK_F9 COL4ROW1='S' COL4ROW2=VK_RIGHT COL4ROW3='F' COL4ROW4='H' COL4ROW5='K' COL4ROW6='2' COL4ROW7=VK_UP ;;;;;;;;;;;;;;;;;;;;;;;;;;; COL5ROW0='6' COL5ROW1='Z' COL5ROW2
Key Maps 271 ;;---------------------------------------------------;; the name of this key doesn't matter ;; the important part is the MAP value ;; codes are defined in docs ;; this is the map for keys with only 2ND ;;---------------------------------------------------[Map] MAP=MAP_2ND ;;;;;;;;;;;;;;;;;;;;;;;;;;; COL0ROW0=open COL0ROW1=VK_CAPITAL COL0ROW2=ACTION+POWER COL0ROW3=SHIFT+VK_PAUSE COL0ROW4=open COL0ROW5=open COL0ROW6=VK_HYPHEN COL0ROW7=ACTION+SCAN1 ;;;;;;;;;;;;;;;;;;;;;;;;;;; COL1ROW0=SHIFT+'1'
272 Key Maps COL5ROW2=VK_INSERT COL5ROW3=open COL5ROW4=SHIFT+VK_BACKQUOTE COL5ROW5=SHIFT+VK_HYPHEN COL5ROW6=VK_DELETE COL5ROW7=VK_NEXT ;;;;;;;;;;;;;;;;;;;;;;;;;;; COL6ROW0=ACTION+BACKLIGHT COL6ROW1=SHIFT+'2' COL6ROW2=open COL6ROW3=SHIFT+'4' COL6ROW4=SHIFT+'6' COL6ROW5=SHIFT+'8' COL6ROW6=SHIFT+VK_LBRACKET COL6ROW7=SHIFT+'0' ;;;;;;;;;;;;;;;;;;;;;;;;;;; COL7ROW0=SHIFT+'3' COL7ROW1=open COL7ROW2=open COL7ROW3=open COL7ROW4=CHANGE+MAP_CONTRAST COL7ROW5=VK_SLASH COL7ROW6=CHANGE+MAP_VOLUME COL7ROW7=open ;;-------
Key Maps 273 COL2ROW5='1' COL2ROW6=open COL2ROW7='3' ;;;;;;;;;;;;;;;;;;;;;;;;;;; COL3ROW0=open COL3ROW1=open COL3ROW2=open COL3ROW3=open COL3ROW4=open COL3ROW5='0' COL3ROW6=open COL3ROW7=open ;;;;;;;;;;;;;;;;;;;;;;;;;;; COL4ROW0=open COL4ROW1=open COL4ROW2=open COL4ROW3=open COL4ROW4=open COL4ROW5=open COL4ROW6='2' COL4ROW7=open ;;;;;;;;;;;;;;;;;;;;;;;;;;; COL5ROW0='6' COL5ROW1=open COL5ROW2=open COL5ROW3=open COL5ROW4=open COL5ROW5=open COL5ROW6=open COL5ROW7=open ;;;;;;;;;;;;;;;;;;;;;;;;;;; COL6ROW0=open
274 Key Maps ;;---------------------------------------------------;; the name of this key doesn't matter ;; the important part is the MAP value ;; codes are defined in docs ;; this is the map for keys with only SHIFT ;;---------------------------------------------------[Map] MAP=MAP_SHIFT ;;;;;;;;;;;;;;;;;;;;;;;;;;; COL0ROW0=SHIFT+VK_ESCAPE COL0ROW1=SHIFT+VK_F1 COL0ROW2=ACTION+POWER COL0ROW3=SHIFT+VK_F2 COL0ROW4=SHIFT+VK_F5 COL0ROW5=SHIFT+VK_F7 COL0ROW6=SHIFT+'8' COL0ROW7=ACTION+SCAN1 ;;;;;;;;;;;;;;;;;;;;
Key Maps 275 COL5ROW2=SHIFT+VK_BACK COL5ROW3=SHIFT+'C' COL5ROW4=SHIFT+'B' COL5ROW5=SHIFT+'M' COL5ROW6=SHIFT+VK_PERIOD COL5ROW7=SHIFT+VK_DOWN ;;;;;;;;;;;;;;;;;;;;;;;;;;; COL6ROW0=SHIFT+VK_F10 COL6ROW1=SHIFT+'W' COL6ROW2=SHIFT+VK_RETURN COL6ROW3=SHIFT+'R' COL6ROW4=SHIFT+'Y' COL6ROW5=SHIFT+'I' COL6ROW6=SHIFT+'5' COL6ROW7=SHIFT+'P' ;;;;;;;;;;;;;;;;;;;;;;;;;;; COL7ROW0=SHIFT+'E' COL7ROW1=open COL7ROW2=SHIFT+VK_F3 COL7ROW3=SHIFT+VK_F4 COL7ROW4=SHIFT+VK_F6 COL7ROW5=SHIFT+'7' COL7ROW6=SHIFT+VK_F8 COL7ROW7=open E-
276 Key Maps Sample Output File [HKEY_CURRENT_USER\Keyboard Layout\0409] ;; header limits and special keys ;; MAPCNT ;; MAPCOLS ;; MAPROWS ;; # of keys in each map ;; (unused) ;; (unused) ;; scancode value for power key ;; scancode value for up arrow ;; scancode value for down arrow ;; scancode value for scan key 1 ;; scancode value for scan key 2 ;; scancode value for trigger button ;; scancode value for SHIFT ;; scancode value for ALT ;; scancode value for 2ND ;; scancode value for CTRL key "Head"=hex:
Key Maps 277 00,00,00,00,00,00,35,00,00,00,13,91,2C,37,00,00 ;; Flag2 is the shift codes for the 2ND-SHIFT key map "Flag2"=hex:\ 00,00,A0,00,00,00,00,A0,00,00,A0,00,00,00,00,A0,\ 00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\ 00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\ 00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00 ;; Map3 is the scancode values for the SHIFT key map "Map3"=hex:\ 1B,70,DF,71,74,76,38,87,51,39,89,54,55,34,4F,88,\ 41,00,44,47,4A,31,4C,33,20,00,58,56,4E,30,25,09,\ 78,53,27,46,48,4B,
278 Key Maps List of Valid VK Codes for CE .NET and CE This is the list of codes parsed by KEYCOMP compiler. Refer to Microsoft Windows documentation for further clarification of the meaning of these key codes. Any VK keys not defined here are not valid for use under Windows CE .NET and CE. Note: There may be different VK Codes for Windows CE .NET 4.2 and CE 5.0. Check with your LXE representative before using VK Codes for your MX3X.
Appendix B Technical Specifications Physical Specifications Features Specifications Comments CPU Xscale PXA255 CPU operating at 400 MHz. Turbo mode switching is supported. 32 bit CPU (with on-chip cache) Compact Flash (Internal) Supports an ATA interface only. 3.3v ATA flash card. Inaccessible by customer. Memory ROM 64 MB Flash RAM 64 or 128MB of SDRAM System Memory LCD Monochrome Transflective Transflective LCD with touchscreen.
280 Technical Specifications Features Specifications Audio Connector Dimensions w/Endcap Batteries Comments Audio Jack Length 6” 15 cm Width 8” 20 cm Depth (No RFID) 1.44” 3.66 cm Depth (With RFID Module) 1.88” 4.77 cm Main 1900 mAh 10.8V, 3 cell, Li-Ion battery pack In-Unit Chargeable or Externally Chargeable Backup (CMOS) Internal Nickel-Cadmium (NiCd) 5.7V max.
Technical Specifications 281 Cable Specifications Caution: Do Not Use this Port for Cables with USB Plugs/Receptacles: Caution: Do Not Use these Labeled Ports for Tethered Scanners: Cable Ends Receptacle Plug Receptacle Plug USB A USB A RS232 RS232 USB B USB B Cable Pinouts and Diagrams MX3X068CBLD9USBHOST – CBL, USB D9F to USB Type A Receptacle ActiveSync: Connect from mobile device USB-C port to USB Type A Host. E.g. laptop/desktop PC.
282 MX3XA070CBLD9RS232AS - Cable, RS232 (D9F) / RS232 (D9F) MX3XA068CBLD9USBHOST – CBL, USB D9F to USB Type A Plug Connect from mobile device USB-H to a USB device with a cable that has a Type A plug end. e.g. USB mouse, USB keyboard, etc. Technical Specifications ActiveSync: Connect from desk cradle male serial port to a D9 male serial port on a PC / Laptop. Cable used for serial ActiveSync. Mobile Device Host port End Tethered Scanner: Connect to MX3X powered Cradle D9F Serial port.
Technical Specifications 283 Environmental Specifications Mobile Device and Endcaps Operating Temperature -4°F to 122°F (-20°C to 50°C) monochrome 32°F to 122°F (0°C to 50°C) color Storage Temperature -22°F to 158°F (-30°C to 70°C) Water and Dust IEC IP66 Operating Humidity Up to 90% non-condensing at 104°F (40°C) Ambient Light – ranging from total darkness to direct sunlight Display readable (with backlight on) for <= two hours Contamination Resistant to exposure to skin oil and other lubrican
284 Technical Specifications International AC Adapter Operating Temperature 32°F to 104°F (-0°C to 40°C) Storage Temperature -13°F to 158°F (-25°C to 70°C) Operating Humidity Up to 90% non-condensing at 104°F (40°C) Input Power Switch None Power "ON" Indicator None Input Voltage 108VAC min - 264VAC max Input Frequency 47 - 63 Hz Input Connector Customer supplied Output Connector Barrel connector, female, 5.5 x 2.
Technical Specifications 285 Network Device Specifications Summit Client in PCMCIA Adapter 2.4GHz Bus Interface: Compact Flash via a PCMCIA adapter Network Frequencies: 2.4 - 2.4897 GHz IEEE 802.11b 802.11g DSSS OFDM RF Data Rates: 1, 2, 5.
286 Technical Specifications Hat Encoding The MX3X supports only 7-bit hat encoding which means only ^@ through ^_ (underscore) are supported.
Technical Specifications 287 Desired ASCII Hex Value Hat Encoded Desired ASCII Hex Value ´ µ ¶ · ¸ ¹ º » ¼ ½ ¾ ¿ À Á Â Ã Ä Å Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö B4 B5 B6 B7 B8 B9 BA BB BC BD BE BF C0 C1 C2 C3 C4 C5 C6 C7 C8 C9 CA CB CC CD CE CF D0 D1 D2 D3 D4 D5 D6 ~4 ~5 ~6 ~7 ~8 ~9 ~: ~; ~< ~= ~> ~? ~@ ~A ~B ~C ~D ~E ~F ~G ~H ~I ~J ~K ~L ~M ~N ~O ~P ~Q ~R ~S ~T ~U ~V Ý Þ ß à á â ã ä å æ ç è é ê ë ì í î ï ð ñ ò ó ô õ ö ÷ ø ù ú û ü ý þ ÿ DD DE DF E0 E1 E2 E3 E4 E5 E6 E7 E8 E9 EA EB EC ED EE EF F0 F1
288 Technical Specifications Decimal - Hexadecimal Chart 0 1 2 0x00 0x01 0x02 40 41 42 8 0x28 0x29 0x2A 80 81 82 0x50 0x51 0x52 120 121 122 0x78 0x79 0x7A 3 4 5 0x03 0x04 0x05 43 44 45 0x2B 0x2C 0x2D 83 84 85 0x53 0x54 0x55 123 124 125 0x7B 0x7C 0x7D 6 7 8 9 10 0x06 0x07 0x08 0x09 0x0A 46 47 48 49 50 0x2E 0x2F 0x30 0x31 0x32 86 87 88 89 90 0x56 0x57 0x58 0x59 0x5A 126 127 128 129 130 0x7E 0x7F 0x80 0x81 0x82 11 12 13 14 15 0x0B 0x0C 0x0D 0x0E 0x0F 51 52 53 54 55 0x33 0x34 0x35 0
Technical Specifications 289 160 161 162 163 164 165 0xA0 0xA1 0xA2 0xA3 0xA4 0xA5 200 201 202 203 204 205 0xC8 0xC9 0xCA 0xCB 0xCC 0xCD 240 241 242 243 244 245 0xF0 0xF1 0xF2 0xF3 0xF4 0xF5 166 167 168 169 170 0xA6 0xA7 0xA8 0xA9 0xAA 206 207 208 209 210 0xCE 0xCF 0xD0 0xD1 0xD2 246 247 248 249 250 0xF6 0xF7 0xF8 0xF9 0xFA 171 172 173 174 175 0xAB 0xAC 0xAD 0xAE 0xAF 211 212 213 214 215 0xD3 0xD4 0xD5 0xD6 0xD7 251 252 253 254 255 0xFB 0xFC 0xFD 0xFE 0xFF 176 177 178 179 180 0xB0 0xB1
290 Technical Specifications Revision History Revision G, November 2006 Notices Updated trademark statements. Chapter 1 – Introduction Updated “Overview” description. Added Wavelink Avalanche Enabler to “Features/Options of the MX3X Family”. Updated “Related Manuals” section. Updated RoHS Accessories. Chapter 2 – Physical Description and Layout Added contents of Chapter 3 “Power Supply” to Chapter 2. Chapter 3 – Power Supply Deleted. Contents added to Chapter 2.
Technical Specifications 291 Added new section titled “Connect External Power Supply to the MX3P”. Added information and Accessories for the MX3P mobile device. Chapter 2 – Physical Description and Layout Added “RTS/CTS Handshaking and the Serial Port”. Chapter 3 – Power Supply Corrected the following statement: “The MX3X is designed to achieve 8+ hours of continuous operation.” The statement is now correct.
292 Technical Specifications Chapter 5 – MX3-RFID Updated RFID Configuration Utility: • Added Filter, Firmware, and Format tabs to RFID Configuration Utility Panel. • 96 bit Class 1 tag support added. • EPC Tag Data Formatting added. • Added robust Read support. Revision C, December 2004 Entire Manual Noted differences between MX3X standard and the MX3-RFID device. Chapter 1 – Introduction Consolidated ActiveSync information and instructions. Corrected part numbers for MX3-RFID accessories.
Index 2 2nd key function.....................................................58 A About software, hardware, version, network IP.............82 Accessibility settings ............................................84 Accessories Electrostatic Discharge .........................................8 Install ....................................................................8 Activation Key....................................................235 Activation Key, AppLock Multiple Applications.18 ActiveSync...........
294 edit buttons........................................................146 Barcode manipulation .........................................136 Barcode match list ..............................................146 Barcode processing overview .............................136 Barcode Scanner Integrated ............................................................53 Tethered ..............................................................53 Barcode Tab........................................................
Index Cradles, function...................................................37 Create a dialup, direct, or VPN connection ..........93 Creating Custom Keymaps ...................................60 Critical Suspend....................................................66 what happens when .............................................67 Critical Suspend mode ..........................................49 Critical Suspend state ...........................................67 Ctrl Char Mapping...........................
296 Index F I Factory Default, reset registry to ........................134 Failure Battery Pack ........................................................67 Features...................................................................2 Field Exit ............................................................156 Field Exit key function .........................................57 FLASH..................................................................43 FTP Server, start and stop...............................
Index ALT function ......................................................61 BATT B function ................................................61 BATT M function ...............................................61 CAPS function ....................................................61 CHGR function ...................................................61 CTRL function ....................................................61 on keypads,location.............................................61 SCNR function.................
298 AppLock Save As .............................................238 Passwords lost at cold boot.................................117 PC Card.................................................................45 Storage ................................................................25 PC card slots .........................................................24 PCMCIA...............................................................45 Slots 0, 1 and 2....................................................
Index Phillips, for handstrap .........................................10 SE923 scan engine................................................27 Security Single User AppLock........................................242 Security options, supported.................................169 Security Panel AppLock ...........................................................236 Security Password AppLock ...........................................................237 Security, Internet.........................................
300 TouchDisable......................................................116 Touchscreen..........................................................62 Transcriber............................................................79 Transflective Display............................................44 Translate All ...............................................149, 163 Translate control codes .......................................149 Transmissive Display......................................