Honeywell Thor VM2 User Manual page 246

Vehicle-mount computer with microsoft windows embedded ce 6.0
Hide thumbs Also See for Thor VM2:
Table of Contents

Advertisement

Parameter
TTLS Inner Method Auto-EAP
PMK Caching
WAPI
TX Diversity
RX Diversity
Frag Thresh
RTS Thresh
LED
Tray Icon
Hide Password
8 - 12
Default
Function
Authentication method used within the secure tunnel created by EAP-
TTLS.
Options are:
AUTO-EAP (Any available EAP method)
MSCHAPV2
MSCHAP
PAP
CHAP
EAP-MSCHAPV2
Standard
Type of Pairwise Master Key (PMK) caching to use when WPA2 is in
use. PMK caching is designed to speed up roaming between APs by al-
lowing the client and the AP to cache the results of 802.1X authentica-
tions, eliminating the need to communicate with the ACS server.
Standard PMK is used when there are no controllers. The reauthentica-
tion information is cached on the original AP. The client and the AP use
the cached information to perform the four-way handshake to exchange
keys. Opportunistic PMK (OPMK) is used when there are controllers.
The reauthentication information cached on the controllers. The client
and the controller behind the AP use the cached information to perform
the four-way handshake to exchange keys.
If the selected PMK caching method is not supported by the network in-
frastructure, every roam requires full 802.11X authentication, including
interaction with the ACS server.
If the active profile is using WPA2 CCKM, the global PMK Caching set-
ting is ignored and the client attempts to use CCKM.
Options are: Standard, OPMK
Off
Default is Off and dimmed (cannot be changed).
ABG: On
How to handle antenna diversity when transmitting packets to the Ac-
cess Point.
Options are: Main only (use the main antenna only), Aux only (use the
auxiliary antenna only), or On (use diversity or both antennas).
ABG: On Start on Main How to handle antenna diversity when receiving packets from the Ac-
cess Point.
Options are: Main Only (use the main antenna only), Aux Only (use the
auxiliary antenna only), On-start on Main (on startup, use the main an-
tenna), or On-start on Aux (on startup, use the auxiliary antenna).
2346
If the packet size (in bytes) exceeds the specified number of bytes set
in the fragment threshold, the packet is fragmented (sent as several
pieces instead of as one block). Use a low setting in areas where com-
munication is poor or where there is a great deal of wireless interfer-
ence.
This parameter cannot be changed.
2347
If the packet size exceeds the specified number of bytes set in the Re-
quest to Send (RTS) threshold, an RTS is sent before sending the pack-
et. A low RTS threshold setting can be useful in areas where many client
devices are associating with the Access Point.
This parameter cannot be changed.
Off
The LED on the wireless card is not visible to the user when the wireless
card is installed in a sealed mobile device.
Options are: On, Off.
This parameter cannot be changed.
On
Determines if the Summit icon is displayed in the System tray.
Options are: On, Off
On
When On, the Summit Config Utility masks passwords (characters on
the screen are displayed as an *) as they are typed and when they are
viewed. When Off, password characters are not masked.
Options are: On, Off.

Advertisement

Table of Contents
loading

Table of Contents