Honeywell Thor VM2 User Manual page 10

Vehicle-mounted computer with microsoft windows embedded ce 6.0
Hide thumbs Also See for Thor VM2:
Table of Contents

Advertisement

Stop the Enabler Service..................................................................................................................... 278
Update Monitoring Overview ............................................................................................................ 279
Mobile Device Wireless and Network Settings........................................................................... 279
Preparing a Device for Remote Management ............................................................................ 280
User Interface ................................................................................................................................................ 282
Enabler Configuration................................................................................................................................ 282
File Menu Options ................................................................................................................................. 283
Avalanche Update using File > Settings ....................................................................................... 283
Using Remote Management.................................................................................................................... 295
eXpress Scan.................................................................................................................................................. 296
Step 1: Create Bar Codes .................................................................................................................... 296
Step 2: Scan Bar Codes ....................................................................................................................... 296
Step 3: Process Completion............................................................................................................... 297
Chapter 8 - Wireless Network Connections .......................................................... 299
Summit Wireless Network Configuration ........................................................................................... 299
Important Notes............................................................................................................................................ 299
Summit Client Utility................................................................................................................................... 299
Help ............................................................................................................................................................. 300
Summit Tray Icon ................................................................................................................................... 300
Wireless Zero Config Utility................................................................................................................ 301
Main ............................................................................................................................................................ 302
Profile ......................................................................................................................................................... 304
Status.......................................................................................................................................................... 308
Diags ........................................................................................................................................................... 309
Global ......................................................................................................................................................... 310
Sign-On vs. Stored Credentials .............................................................................................................. 315
To Use Stored Credentials .................................................................................................................. 315
To Use Sign On Screen ........................................................................................................................ 316
Windows Certificate Store vs. Certs Path ........................................................................................... 317
User Certificates..................................................................................................................................... 317
Root CA Certificates.............................................................................................................................. 317
Configuring the Profile............................................................................................................................... 318
No Security ............................................................................................................................................... 318
WEP ............................................................................................................................................................. 319
LEAP ........................................................................................................................................................... 320
viii
Thor VM2 with with Microsoft Windows Embedded CE 6.0 User Guide

Advertisement

Table of Contents
loading

Table of Contents