Honeywell Thor VM2 User Manual page 223

Vehicle-mounted computer
Hide thumbs Also See for Thor VM2:
Table of Contents

Advertisement

Property
PMK
Caching
TX
Diversity
RX
Diversity
Frag
Thresh
RTS
Thresh
LED
Tray Icon
Admin
Password
Auth
Timeout
Thor VM2 with with Microsoft Windows 7 or Windows Embedded Standard User Guide
Default
Explanation
Value
Standard
Type of Pairwise Master Key (PMK) caching to use when WPA2 is in use. PMK
caching is designed to speed up roaming between APs by allowing the client
and the AP to cache the results of 802.1X authentications, eliminating the
need to communicate with the ACS server. Standard PMK is used when there
are no controllers. The reauthentication information is cached on the original
AP. The client and the AP use the cached information to perform the four-
way handshake to exchange keys. Opportunistic PMK (OPMK) is used when
there are controllers. The reauthentication information cached on the
controllers. The client and the controller behind the AP use the cached
information to perform the four-way handshake to exchange keys.
If the selected PMK caching method is not supported by the network
infrastructure, every roam requires full 802.11X authentication, including
interaction with the ACS server.
If the active profile is using WPA2 CCKM, the global PMK Caching setting is
ignored and the client attempts to use CCKM.
Options are: Standard, OPMK
On
How to handle antenna diversity when transmitting packets to the Access
Point.
Options are: Main only, Aux only, and On.
On-start on
How to handle antenna diversity when receiving packets from the Access
Main
Point.
Options are: Main only, Aux only, On-start on main, and On-start on Aux.
2346
If the packet size (in bytes) exceeds the specified number of bytes set in the
fragment threshold, the packet is fragmented (sent as several pieces instead
of as one block). Use a low setting in areas where communication is poor or
where there is a great deal of wireless interference.
Options are: Any number between 256 bytes and 2346 bytes.
2347
If the packet size exceeds the specified number of bytes set in the Request to
Send (RTS) threshold, an RTS is sent before sending the packet. A low RTS
threshold setting can be useful in areas where many client devices are
associating with the Access Point.
This parameter cannot be changed.
Off
The LED on the wireless card is not visible to the user when the wireless card
is installed in a sealed mobile device.
Options are: On, Off.
N/A
The tray icon is not displayed when the Thor VM2 is running a Windows
Embedded Standard 2009, Windows Embedded Standard 7 or Windows 7
Professional operating system.
SUMMIT
A string of up to 64 alphanumeric characters that must be entered when the
(or Blank)
Admin Login button is tapped. If Hide Password is On, the password is
masked when typed in the Admin Password Entry dialog box. The password is
case sensitive. This value is masked when the Admin is logged out.
Options are: none.
8 seconds
Specifies the number of seconds the Laird software waits for an EAP
authentication request to succeed or fail.
If the authentication credentials are stored in the active profile and the
authentication times out, the association fails. No error message or
prompting for corrected credentials is displayed.
If the authentication credentials are not stored in the active profile and the
authentication times out, the user is again prompted to enter the credentials.
Options are: An integer from 3 to 60.
217

Advertisement

Table of Contents
loading

Table of Contents