Honeywell Thor VM2 User Manual page 8

Hide thumbs Also See for Thor VM2:
Table of Contents

Advertisement

BIOS .................................................................................................................................. 5-48
Accessing the BIOS Setup .......................................................................................... 5-48
Boot Order ................................................................................................................... 5-48
Exiting BIOS Setup ...................................................................................................... 5-48
Thor VM2 Recovery DVD .................................................................................................. 5-49
Thor VM2 Drivers DVD...................................................................................................... 5-49
Thor VM2 with no Operating System................................................................................. 5-49
Upgrading the Thor VM2 ................................................................................................... 5-49
Automatic Firmware Update Utility .................................................................................... 5-49
Requirements .............................................................................................................. 5-50
Firmware Distribution Files .......................................................................................... 5-50
Update Process ........................................................................................................... 5-50
Configuration Cloning Utility (CCU) ................................................................................... 5-51
Launching Configuration Cloning Utility GUI ............................................................... 5-52
Windows Embedded Standard 7 and Windows 7 Professional:............................ 5-53
Using Configuration Cloning Utility GUI....................................................................... 5-53
Menu Options ........................................................................................................ 5-53
Shortcuts................................................................................................................ 5-54
Modifying Settings ................................................................................................. 5-55
Using the CCU....................................................................................................... 5-55
Configuration Cloning Utility Command Line Interface ................................................ 5-57
Network Connections Control Panel.................................................................................... 6-1
Laird Wireless Network Configuration ................................................................................. 6-1
Important Notes ............................................................................................................. 6-1
Laird Connection Manager ............................................................................................ 6-1
Tray Icon.................................................................................................................. 6-1
Wireless Zero Config Utility ..................................................................................... 6-2
Status....................................................................................................................... 6-3
Configuration ........................................................................................................... 6-4
Diagnostics ............................................................................................................ 6-10
Sign-On vs. Stored Credentials ................................................................................... 6-12
To Use Stored Credentials .................................................................................... 6-13
To Use Sign On Screen......................................................................................... 6-14
Windows Certificate Store vs. Certs Path.................................................................... 6-14
User Certificates .................................................................................................... 6-15
Root CA Certificates .............................................................................................. 6-15
Configuring the Profile ................................................................................................. 6-16
No Security ............................................................................................................ 6-17
WEP....................................................................................................................... 6-18
LEAP...................................................................................................................... 6-19
PEAP/MSCHAP..................................................................................................... 6-20
PEAP/GTC............................................................................................................. 6-22
WPA/LEAP ............................................................................................................ 6-24
EAP-FAST ............................................................................................................. 6-26
EAP-TLS................................................................................................................ 6-28
vi

Advertisement

Table of Contents
loading

Table of Contents