User's Manual
Table Of Contents
- Introduction 1
- Basic Checkout 2
- 2.2 Preparing The 7545 For Operation
- 2.3 Powering Up The 7545
- 2.5 Calibrating The Touchscreen
- 2.6 Configuring Your Radio
- 2.7 Configuring An IEEE 802.11 Radio In The Unit
- 2.8 Summit Client Utility (SCU) For 802.11b/g Radio
- 2.9 Checking The Scanner
- 2.10 Data Transfer Between The 7545 And A PC
- 2.11 Resetting The 7545
- Getting To Know Your 7545 3
- Windows Embedded CE 5.0 4
- Configuration 5
- 5.1 Remote Connect
- 5.2 The TekTerm Application
- 5.3 Pocket PC Compatibility
- 5.4 The Control Panel
- 5.5 Control Panel Icons
- 5.6 Control Panel Applications: Basic Setup
- 5.7 Bluetooth Setup
- 5.8 Error Reporting
- 5.9 IPv6 Support
- 5.10 Scanner Settings
- 5.11 SNMP (Simple Network Management Protocol) Setup
- 5.12 The Storage Manager
- 5.13 Teklogix Error Handling Service
- 5.14 Teklogix Imagers
- 5.15 Total Recall
- 5.16 TweakIT Settings
- Specifications 7
- Appendix B
- SCU For 802.11b/g Radio
- B.1.2.1 SCU Security Capabilities
- B.1.2.2 SCU EAP Types
- B.1.2.3 EAP Credentials
- B.1.2.4 ThirdPartyConfig
- Appendix C
- Bar Code Settings
- C.1 Bar Code Settings
- C.2 Decoded (Internal) Scanners
- C.2.1 Options
- C.2.2 Decoded (Internal) Advanced Options
- C.2.3 Decoded (Internal) 2D Scanning Options
- C.2.4 Decoded (Internal) Data Options
- C.2.5 Code 39
- C.2.6 Code 128
- C.2.7 EAN 13
- C.2.8 EAN 8
- C.2.9 UPC A
- C.2.10 UPC E
- C.2.11 UPC/EAN Shared Settings
- C.2.12 Code 93
- C.2.13 Codabar
- C.2.14 MSI Plessey
- C.2.15 Interleaved 2 of 5
- C.2.16 Discrete 2 of 5
- C.2.17 RSS Code (Reduced Space Symbology)
- C.2.18 Composite
- C.2.19 PDF-417
- C.2.20 Micro PDF-417
- C.3 Decoded (Intermec ISCP)
- C.3.1 Decoded (ISCP) Options
- C.3.2 Decoded (ISCP) Advanced Options
- C.3.3 Code 39
- C.3.4 Code 128
- C.3.5 EAN 13
- C.3.6 EAN 8
- C.3.7 UPC A
- C.3.8 UPC E Settings
- C.3.9 UPC/EAN Shared Settings
- C.3.10 Code 93
- C.3.11 Codabar
- C.3.12 MSI Plessey
- C.3.13 Code 11
- C.3.14 Interleaved 2 of 5
- C.3.15 Matrix 2 of 5
- C.3.16 Discrete 2 of 5
- C.3.17 Telepen
- C.3.18 RSS Code (Reduced Space Symbology)
- C.3.19 Composite
- C.3.20 TLC-39
- C.3.21 PDF-417
- C.3.22 Micro PDF-417
- C.3.23 Codablock
- C.4 Imager
- C.4.1 Imager Options
- C.4.2 Imager Advanced Options
- C.4.3 Code 39
- C.4.4 Code 128
- C.4.5 EAN 13
- C.4.6 EAN 8
- C.4.7 UPC A
- C.4.8 UPC E
- C.4.9 Code 93
- C.4.10 Codabar
- C.4.11 Interleaved 2 of 5
- C.4.12 RSS Code (Reduced Space Symbology)
- C.4.13 Composite
- C.4.14 PDF-417
- C.4.15 Micro PDF-417
- C.4.16 2D Data Matrix
- C.4.17 2D QR Code
- C.4.18 2D Maxicode
- C.4.19 2D Aztec
- C.4.20 Postal: PlaNET
- C.4.21 Postal: PostNET
- C.4.22 Postal: Australian
- C.4.23 Postal: Japanese
- C.4.24 Postal: Korean
- C.4.25 Postal: Royal
- C.4.26 Postal: Kix
- C.4.27 Postal: Canadian
- C.5 Non-Decoded Scanners
Chapter 2: Basic Checkout
Configuring An IEEE 802.11 Radio In The Unit
24 Psion Teklogix 7545 Hand-Held Computer User Manual
Network Key
This text box is used to specify a 5 or 13 ASCII character sequence or an equivalent 10
or 26 Hexadecimal digit sequence that matches the active WEP key on the access point.
• To assign a Network key, highlight The key is provided automatically, and uncheck
the checkbox to disable this option.
Figure 2.9 Accessing Network Key And Key Index
Key Index
This field is used to identify the WEP key.
• Enter a value from 1 to 4.
Enable 802.1x Authentication
802.1X is the IEEE standard that offers additional security for local area networks. It
provides authentication for user devices attached to an Ethernet network, whether wired
or wireless. A security protocol packet such as TLS or MD5 encapsulated in an EAP is
used in conjunction with the 802.1X standard to authenticate users at the MAC layer.
Available EAPs are listed in the drop-down menu next to the EAP option.
• To activate 802.1X, highlight 802.1x authentication, and check the checkbox.
EAP Type (Extensible Authentication Protocol)
This drop-down menu lists the EAP types available on your system. The items in this -
down menu will vary depending on your network setup. Keep in mind also that some
authentication protocols require that you select a Certificate. By selecting the Properties
button, you will be able to select a Certificate. “Certificates” on page 96 outlines how to
create certificates for your network.
Disable this option to
access Network Key &
Key Index fields.
Preliminary Draft 3