Zebra MC3100/MC3190 Mobile Computer Fusion 3.00 User Guide English

Wireless Fusion Enterprise Mobility Suite
User Guide for Version 3.00
Wireless Fusion Enterprise Mobility Suite
User Guide for Version 3.00
72E-122495-02
Rev. A
March 2015
© 2015 ZIH Corp and/or its affiliates. All rights reserved.
No part of this publication may be reproduced or used in any form, or by any electrical or mechanical means, without permission in writing from Zebra. This includes electronic or mechanical means, such as photocopying, recording, or information storage and retrieval systems. The material in this manual is subject to change without notice.
The software is provided strictly on an “as is” basis. All software, including firmware, furnished to the user is on a licensed basis. Zebra grants to the user a non-transferable and non-exclusive license to use each software or firmware program delivered hereunder (licensed program). Except as noted below, such license may not be assigned, sublicensed, or otherwise transferred by the user without prior written consent of Zebra. No right to copy a licensed program in whole or in part is granted, except as permitted under copyright law. The user shall not modify, merge, or incorporate any form or portion of a licensed program with other program material, create a derivative work from a licensed program, or use a licensed program in a network without written permission from Zebra. The user agrees to maintain Zebra’s copyright notice on the licensed programs delivered hereunder, and to include the same on any authorized copies it makes, in whole or in part. The user agrees not to decompile, disassemble, decode, or reverse engineer any licensed program delivered to the user or any portion thereof.
Zebra reserves the right to make changes to any software or product to improve reliability, function, or design.
Zebra does not assume any product liability arising out of, or in connection with, the application or use of any product, circuit, or application described herein.
No license is granted, either expressly or by implication, estoppel, or otherwise under any Zebra, intellectual property rights. An implied license only exists for equipment, circuits, and subsystems contained in Zebra products.

Revision History

Changes to the original manual are listed below:
Change Date Description
-01 Rev. A 06/25/09 Initial release.
-01 Rev. B 02/16/10 Add Windows Mobile 6.5 support for launching Fusion applications.
-02 Rev. A 03/28/15 Zebra rebranding.
iii

Table of Contents

Revision History.................................................................................................................................... iii
About This Guide
Introduction ........................................................................................................................................... ix
Chapter Descriptions ............................................................................................................................ ix
Notational Conventions......................................................................................................................... x
Related Documents .............................................................................................................................. x
Chapter 1: Getting Started
Introduction .......................................................................................................................................... 1-1
Configuring the Infrastructure .............................................................................................................. 1-1
Fusion Overview .................................................................................................................................. 1-1
Fusion Signal Strength Icon ................................................................................................................. 1-2
Fusion Functions ................................................................................................................................. 1-2
Enable/Disable Radio .................................................................................................................... 1-3
Hide Menu ...................................................................................................................................... 1-4
Exit ................................................................................................................................................. 1-4
Windows Mobile 6.5 Default Today Screen Plug-in ............................................................................. 1-4
Minimum Setup .................................................................................................................................... 1-5
Chapter 2: Find WLAN Application
Introduction .......................................................................................................................................... 2-1
Chapter 3: Manage Profiles Application
Introduction .......................................................................................................................................... 3-1
Connect to a Profile ............................................................................................................................. 3-2
Editing a Profile .................................................................................................................................... 3-3
Creating a New Profile ......................................................................................................................... 3-3
Deleting a Profile ................................................................................................................................. 3-4
Ordering Profiles .................................................................................................................................. 3-4
Export a Profile .................................................................................................................................... 3-4
Profile Roaming ................................................................................................................................... 3-4
Chapter 4: Profile Editor Wizard
Introduction .......................................................................................................................................... 4-1
Profile Name ........................................................................................................................................ 4-1
Operating Mode ................................................................................................................................... 4-2
Ad-hoc ................................................................................................................................................. 4-3
Security Mode ...................................................................................................................................... 4-4
Authentication Type ............................................................................................................................. 4-6
CCX Options ........................................................................................................................................ 4-6
Tunneled Authentication ...................................................................................................................... 4-7
User Certificate Selection .................................................................................................................... 4-9
User Certificate Installation ............................................................................................................ 4-9
Server Certificate Selection ........................................................................................................... 4-11
Server Certificate Installation ......................................................................................................... 4-11
User Name ..................................................................................................................................... 4-12
Password ............................................................................................................................................. 4-13
Advanced Identity ................................................................................................................................ 4-14
Credential Cache Options .................................................................................................................... 4-15
Encryption ............................................................................................................................................ 4-17
Hexadecimal Keys ......................................................................................................................... 4-19
Pass-phrase Dialog ........................................................................................................................ 4-20
IPv4 Address Entry .............................................................................................................................. 4-21
Transmit Power .................................................................................................................................... 4-24
Battery Usage ...................................................................................................................................... 4-25
Chapter 5: Manage Certificates Application
Introduction .......................................................................................................................................... 5-1
Certificate Properties ........................................................................................................................... 5-2
Import a Certificate .............................................................................................................................. 5-3
Delete a Certificate .............................................................................................................................. 5-5
Chapter 6: Manage PACs Application
Introduction .......................................................................................................................................... 6-1
PAC Properties .................................................................................................................................... 6-2
Delete PAC .......................................................................................................................................... 6-2
Import PAC .......................................................................................................................................... 6-3
Chapter 7: Options
Introduction .......................................................................................................................................... 7-1
Op (Operating) Mode Filtering ............................................................................................................. 7-1
Regulatory Options .............................................................................................................................. 7-2
Band Selection ..................................................................................................................................... 7-2
System Options ................................................................................................................................... 7-3
Auto PAC Settings ............................................................................................................................... 7-3
Table of Contents vii
IPv6 ...................................................................................................................................................... 7-5
Change Password ............................................................................................................................... 7-5
Export .................................................................................................................................................. 7-6
Chapter 8: Wireless Status Application
Introduction .......................................................................................................................................... 8-1
Signal Strength Window ................................................................................................................. 8-2
Current Profile Window .................................................................................................................. 8-3
IPv4 Status Window ................................................................................................................. 8-4
IPv6 Status Window ....................................................................................................................... 8-5
Wireless Log Window .................................................................................................................... 8-7
Saving a Log ............................................................................................................................ 8-8
Clearing the Log ....................................................................................................................... 8-8
Logos & Certifications Window ...................................................................................................... 8-8
Versions Window ........................................................................................................................... 8-9
Chapter 9: Wireless Diagnostics Application
Introduction .......................................................................................................................................... 9-1
ICMP Ping Window ........................................................................................................................ 9-1
Graphs ........................................................................................................................................... 9-3
Trace Route Window ..................................................................................................................... 9-3
Known APs Window ....................................................................................................................... 9-4
Chapter 10: Log On/Off Application
Introduction .......................................................................................................................................... 10-1
Logging On .......................................................................................................................................... 10-1
Logging Off .................................................................................................................................... 10-3
Chapter 11: Persistence
Introduction .......................................................................................................................................... 11-1
Persisting Fusion Settings ................................................................................................................... 11-1
Returning to Factory Default Settings .................................................................................................. 11-2
Chapter 12: Registry Controlled Features
NPCS ................................................................................................................................................... 12-1
FIPS 140-2 ..................................................................................................................................... 12-2
WMM UAPSD ...................................................................................................................................... 12-2
Chapter 13: Configuration Examples
Introduction .......................................................................................................................................... 13-1
EAP–FAST/MS Chap v2 Authentication .............................................................................................. 13-1
Glossary
Index

About This Guide

Introduction

This guide provides information about using the Fusion Wireless Companion software on a Zebra mobile computer.
NOTE Screens and windows pictured in this guide are samples and can differ from actual screens.
This guide describes the functionally using Windows Mobile operating system. Functionality for the WIndows CE operating system may differ.

Chapter Descriptions

Topics covered in this guide are as follows:
Chapter 1, Getting Started provides an overview of the Fusion Wireless Companion software.
Chapter 2, Find WLAN Application provides information about the Find WLAN application.
Chapter 3, Manage Profiles Application provides information about managing profiles.
Chapter 4, Profile Editor Wizard explains how to configure a profile.
Chapter 5, Manage Certificates Application explains how to manage certificates.
Chapter 6, Manage PACs Application explains how to manage PACs.
Chapter 7, Options explains how to configure the Fusion options.
Chapter 8, Wireless Status Application describes how to get status about the wireless connection.
Chapter 9, Wireless Diagnostics Application describes tools to help diagnose problems with the wireless
connection.
Chapter 10, Log On/Off Application explains how to log on and off the wireless network.
Chapter 11, Persistence explains how to persist Fusion data and settings across a clean/cold boot.
Chapter 12, Registry Controlled Features describes Fusion features that are controlled by registry settings.
Chapter 13, Configuration Examples provides examples for setting up profiles with various authentication
and encryption types.
x Wireless Fusion Enterprise Mobility Suite User Guide

Notational Conventions

The following conventions are used in this document:
Italics are used to highlight the following:
Chapters and sections in this and related documents
Dialog box, window and screen names
Icons on a screen.
Bold text is used to highlight the following:
Key names on a keypad
Button names on a screen or window.
Drop-down list and list box names
Check box and radio button names
bullets (•) indicate:
Action items
Lists of alternatives
Lists of required steps that are not necessarily sequential
Sequential lists (e.g., those that describe step-by-step procedures) appear as numbered lists.
NOTE This symbol indicates something of special interest or importance to the reader. Failure to read the note
will not result in physical harm to the reader, equipment or data.
CAUTION This symbol indicates that if this information is ignored, the possibility of data or material damage may
WARNING! This symbol indicates that if this information is ignored the possibility that serious personal

Related Documents

Enterprise Mobility Developer Kit for C (EMDK for C), available at: http://www.zebra.com/support.
ActiveSync 4.x software, available at: http://www.microsoft.com.
For the latest version of this guide and all guides, go to: http://www.zebra.com/support.
occur.
injury may occur.
Chapter 1 Getting Started

Introduction

Each Zebra mobile computer has a wireless local area network (WLAN) interface. This WLAN interface is controlled by a suite of application software known as Fusion Wireless Companion. The Fusion software allows the user to configure and control the wireless radio in order to securely connect to the WLAN infrastructure. This guide enables the user to configure the mobile computer so that it can connect properly to a WLAN. This guide describes how to use the Fusion software.

Configuring the Infrastructure

WLANs allow mobile computers to communicate wirelessly. Before using the mobile computer on a WLAN, the facility must be set up with the required hardware to run the WLAN (sometimes known as infrastructure). The infrastructure and the mobile computer must both be properly configured to enable this communication.
Refer to the documentation provided with the infrastructure (access points (APs), access ports, switches, Radius servers, etc.) for instructions on how to set up the infrastructure.
Once you have set up the infrastructure to enforce your chosen WLAN security scheme, use the Fusion software to configure the mobile computer to match.

Fusion Overview

The Fusion software contains applications with which to create wireless profiles. Each profile specifies the security parameters to use for connecting to a particular WLAN as identified by its ESSID. The Fusion software also allows the user to control which profile out of a set of profiles is used to connect. Other Fusion applications allow the user to monitor the status of the current WLAN connection and to invoke diagnostic tools for troubleshooting.
The Fusion applications are typically accessed through the pop-up menu associated with the Fusion Signal
Strength icon. This icon appears in the bottom right hand corner of the screen. To invoke the Fusion Wireless Applications menu, tap the icon.

Fusion Signal Strength Icon

The shape and color of the Signal Strength icon provides information about the received wireless signal strength for the WLAN connection. Table 1-1 describes the different icons and their meanings.
Table 1-1
Icon Status Description
None The Wireless Launcher
Signal Strength Icons Descriptions
Excellent signal strength WLAN network is ready to use.
Very good signal strength WLAN network is ready to use.
Good signal strength WLAN network is ready to use.
Fair signal strength WLAN network is ready to use. Notify the network administrator that
the signal strength is only “Fair”.
Poor signal strength WLAN network is ready to use. Performance may not be optimum.
Notify the network administrator that the signal strength is “Poor”.
Out-of-network range (not associated)
The WLAN radio is disabled. The WLAN radio is disabled. To enable, choose Enable Radio from
application was exited.
No WLAN network connection. Notify the network administrator.
the Wireless Applications menu.
The Wireless Launcher application has been closed. See the Fusion Functions paragraphs below for how to restart the Wireless Launcher.

Fusion Functions

Tap the Signal Strength icon to display the Wireless Launcher menu.
Figure 1-1
Many of the items in the menu invoke one of the Fusion applications. These menu items and their corresponding applications are summarized below:
Wireless Launcher Menu
Find WLANs – Invokes the Find WLANs application which displays a list of the WLANs active in your area.
Getting Started 1 - 3
Manage Profiles – Invokes the Manage Profiles application (which includes the Profile Editor Wizard) to manage and edit your list of WLAN profiles.
Manage Certs – Invokes the Certificate Manager application which allows you to manage certificates used for authentication.
Manage PACs – Invokes the PAC Ma n a g er application which helps you manage the list of Protected Access Credentials used with EAP-FAST authentication.
Options – Invokes the Options application which allows you to configure the Fusion option settings.
Wireless Status – Invokes the Wireless Status application which allows you to view the status of the current wireless connection.
Wireless Diagnostics – Invokes the Wireless Diagnostics application which provides tools with which to diagnose problems with the wireless connection.
Log On/Off – Invokes the Network Login dialog which allows you to log on to a particular profile or to log off from the currently active profile.
Each of the items above has a chapter devoted to it in this guide.
Additional Wireless Launcher menu entries include:

Enable/Disable Radio

Hide Menu
Exit.
Enable/Disable Radio
To turn the WLAN radio off, tap the Signal Strength icon and select Disable Radio.
Figure 1-2
Disable Radio
To turn the WLAN radio on, tap the Signal Strength icon and select Enable Radio.
Figure 1-3
Also note that the radio may be enabled or disabled using the Wireless Manager screen.
Enable Radio

Hide Menu

To hide the menu tap Hide in the menu.

Exit

Ta p Exit to close the menu and exit the Wireless Launcher application. A dialog appears to confirm exiting the Wireless Launcher application. Tap Yes to exit. This closes the Wireless launcher application and removes the Signal Strength icon from the screen.
To restart the Wireless Launcher application and redisplay the Signal Strength icon:
1. Ta p Start > Programs > Wireless Companion icon > Wireless Launch icon.
2. Ta p ok twice to close the windows.
3. The Signal Strength icon appears on the screen.

Windows Mobile 6.5 Default Today Screen Plug-in

The interface to the Signal Strength icon and Wireless Launcher has changed in the Windows Mobile 6.5 default Today screen. To view the Wireless Launcher, select the Fusion plug-in on the Today screen and tap the Fusion Menu soft key.
Getting Started 1 - 5
Figure 1-4
Functionality of this dialog is similar to the Wireless Launch menu. Drag the window up and down to view all menu items. Tap the icon next to the item to open it.
Figure 1-5
Fusion Plug-in on Today Screen
Wireless Launcher Window

Minimum Setup

Below is a list of the minimum effort to achieve a wireless connection. Note that there are many discrete nuances that may affect the performance of your wireless connection that might be missed if you do not consider them carefully.
You will need to create a profile. It is recommended that you read the profile editor chapter.
1. Find out from your IT administrator what the connection settings should be (Service Set Identifier (SSID),
Enterprise or Personal, 1x type, tunnel type, certificate requirements,
requirements). Note that not all of the items listed may be relevant.
2. Create the profile using the information provided by the IT administrator.
3. Enter the Manage Profile screen, select the profile (press and hold), and select the Connect option in the
context menu that appears.
Protected Access Credentials
(PAC)
Chapter 2 Find WLAN Application

Introduction

Use the Find WLANs application to discover available networks in the vicinity of your and mobile computer. To open the Find WLANs application, tap the Signal Strength icon > Find WLANs. The Find WLANs window displays.
Figure 2-1
The Find WLANs list displays:
Find WLANs Window
WLAN Networks - Available wireless networks, (both infrastructure and Ad-hoc) with icons that indicate signal strength and encryption. The signal strength and encryption icons are described in Table 2-1 and
Table 2-2.
Network Type - Type of network. 802.11(a), 802.11(b) or 802.11(g).
Channel - Channel on which the AP/Ad-hoc peer is transmitting.
Signal Strength - The signal strength of the signal from the AP/Ad-hoc peer.
.
Table 2-1
Signal Strength Icon
Icon Description
Excellent signal
Very good signal
Good signal
Fair signal
Poor signal
Out of range or no signal
Table 2-2
Encryption Icon
Icon Description
No encryption. WLAN is an infrastructure network.
WLAN is an Ad-hoc network.
WLAN uses encryption. WLAN is an infrastructure network.
Tap-and-hold on a WLAN network to open a pop-up menu which provides three options: Connect to, Create profile and Refresh.
Figure 2-2
Find WLANs Menu.
NOTE The number of WLANs (ESSIDs) that can be detected by the wireless radio at one time is limited. If you have
a large number of WLANs active in your area, the Find WLANs window may not display them all.
If you do not see your ESSID, try a Refresh. If your ESSID is still not displayed and you wish to create or connect to a profile for it, you will need to use the Manage Profiles application.
Select Connect to to view the list of existing profiles matching the select ESSID. The mobile computer connects to the given profile upon selection.
Find WLAN Application 2 - 3
Select Create profile to create a new WLAN profile for that network. This starts the Profile Editor Wizard which allows you to configure the security parameters that your mobile computer will use for the selected network. After editing the profile, the mobile computer automatically connects to this new profile.
NOTE A warning displays when connecting to an unsecure (or open) network via the Find WLANs application. For
open WLANs, the profile’s settings will take on automatically generated default values. If you wish to manually configure the settings, uncheck the Use Default configuration checkbox.
Figure 2-3
Warning Notice
Select Refresh to refresh the WLAN list.
Chapter 3 Manage Profiles Application
WirelessOutofBoxMagic

Introduction

A profile is a set of operating parameters that define how the mobile computer will connect to a specific WLAN. Create different profiles for use in different network environments. The Manage Profiles application displays the list of user-created wireless profiles. You may have a maximum of 32 profiles at any one time. To open the Manage Profiles application, tap the Signal Strength icon > Manage Profiles.
Figure 3-1
Icons next to each profile identify the profile’s current state.
Table 3-1
Icon Description
No Icon Profile is not selected, but enabled.
Manage Profiles Window
Profile Icons
Profile is disabled.
Profile is cancelled. A cancelled profile is disabled until you connect to it, either by selecting Connect from the pop-up menu, or by using the Log On/Off application.
WirelessOutofBoxMagic
Table 3-1
Icon Description
You can perform various operations on the profiles in the list. To operate on an existing profile, tap and hold it in the list and select an option from the menu to connect, edit, disable (enable), or delete the profile. (Note that the Disable menu item changes to Enable if the profile is already disabled.)
Profile Icons (Continued)
Profile is in use and describes an infrastructure profile not using security.
Profile is in use and describes an infrastructure profile using security.
Profile is in use and describes an ad-hoc profile not using security.
Profile is in use and describes an ad-hoc profile using security.
Profile is not valid in the regulatory domain in which the device is currently operating.
Figure 3-2

Connect to a Profile

Tap and hold a profile and select Connect from the pop-up menu to set this as the active profile.
Manage Profiles Context Menu
Manage Profiles Application 3 - 3
WirelessOutofBoxMagic
WirelessOutofBoxMagic
Figure 3-3
Once selected, the mobile computer uses the settings configured in the profile (i.e., authentication, encryption, ESSID, IP Config, power consumption, etc.) to connect to a WLAN.
Manage Profiles - Connect

Editing a Profile

Tap and hold a profile and select Edit from the pop-up menu.This will invoke the Profile Wizard where the profile settings are configured.

Creating a New Profile

To create a new profile tap and hold anywhere in the Manage Profiles window and select Add from the pop-up menu.
Figure 3-4
Selecting Add invokes the Profile Wizard wherein the settings for the new profile are configured, such as profile name, ESSID, security, network address information, and the power consumption level.
Manage Profiles - Add

Deleting a Profile

To delete a profile from the list, tap and hold the profile and select Delete from the pop-up menu. A confirmation dialog box appears.

Ordering Profiles

The profiles are listed in priority order for use by the automatic Profile Roaming feature (see Profile Roaming below). Change the order by moving profiles up or down. Tap and hold a profile from the list and select Move Up or Move Down from the pop-up menu.

Export a Profile

To export a profile to a registry file, tap and hold a profile from the list and select Export from the pop-up menu. The Save As dialog box displays with the Application folder and a default name of WCS_PROFILE{profile GUID}.reg
(Globally Unique Identifier).
Figure 3-5
If required, change the name in the Name field and tap Save. A confirmation dialog box appears after the export completes.
Save As Dialog Box

Profile Roaming

Profile Roaming attempts to automatically select and connect to a profile from the profile list displayed in the Manage Profiles window. The Profile Roaming algorithm uses the order of the profiles in the profile list to determine the order in which profiles are tried.
NOTE Profile Roaming must be enabled in the Options application. See Chapter 7, Options.
The Profile Roaming algorithm makes two passes through the profile list. The first pass attempts to connect only to profiles that specify ESSIDs that can be detected by the wireless radio. If no connection is made, a second pass through the list is performed attempting to connect to those profiles that were not tried in the first pass. The Profile
Manage Profiles Application 3 - 5
Roaming algorithm will only attempt to connect to a profile for which it is not necessary to prompt the user for credentials (i.e., username and password). This includes:
A profile that does not require credentials.
A device profile. A device profile is one in which the username and password have been pre-entered directly into the profile. (A profile with the username specified but with the password field left empty is still considered a device profile since an empty password is considered a valid password.)
A user profile with cached credentials. A user profile is one in which the username and password have not been pre-entered into the profile. A profile has cached credentials if the user has entered credentials for the profile via the Network Login dialog. When a profile has cached credentials, the user is said to have logged on to the profile. See Chapter 10, Log On/Off Application for more information.
The Profile Roaming algorithm will not attempt to connect to:
A profile that specifies EAP-GTC for its Tunnel Authentication Type and Token (as opposed to Static) for its password type. See Tunneled Authentication on page 4-7 for more information.
A user profile without cached credentials.
A user profile that has cached credentials but that also has the At-Connect option enabled. See Credential
Cache Options on page 4-15 for more information.
A device profile that has cached credentials because the user has logged on to it (called a user-override profile), but that also has the At-Connect option enabled.
A profile that has been disabled.
A profile that has been cancelled.
A profile whose Country setting does not allow the profile to be used in the country in which the mobile computer is being operated. See Operating Mode on page 4-2 for more information.
The Profile Roaming algorithm is invoked whenever the mobile computer becomes disconnected (disassociated) from the current WLAN.
Chapter 4 Profile Editor Wizard

Introduction

Use the Profile Editor Wizard to create a new WLAN profile or edit an existing profile. If editing a profile, the fields reflect the current settings for that profile. If creating a new profile, default values appear in the fields.

Navigate through the wizard using the Next and Back buttons. An indicator in the bottom left corner tracks the number of pages traversed and total number of pages required to complete the current profile configuration. Tap X or the Cancel button to quit. On the confirmation dialog box, tap No to return to the wizard or tap Yes to quit and return to the Manage Profiles window. See Chapter 3, Manage Profiles Application for instructions on navigating to and from the Profile Editor Wizard.

Profile Name

In the Profile Name dialog box in the Profile Editor Wizard, enter the profile name and the ESSID.
Figure 4-1
Table 4-1
Profile Name The user-friendly name you wish to give the profile. The profile name is limited to 64
ESSID The ESSID is the 802.11 extended service set identifier. The ESSID is a 32-character
Profile Name Dialog Box
Profile Name Fields
Field Description
characters. Example: The Public LAN.
(maximum) case sensitive string identifying the WLAN, and must match the AP ESSID for the mobile computer to communicate with the AP.
NOTE Two profiles with the same user friendly name are acceptable but not recommended.
Ta p Next. The Operating Mode dialog box displays.

Operating Mode

Use the Operating Mode dialog box to select the operating mode (Infrastructure or Ad-hoc) and the country location.
Figure 4-2
Table 4-2
Operating Mode Select Infrastructure to enable the mobile computer to transmit and receive data with an AP.
Country Country determines if the profile is valid for the country of operation. The profile country must
Table 4-3 defines the regulatory validity of profiles that use infrastructure mode:
Table 4-3
802.11d Settings
Enabled Any Country N/A Country X Valid
Enabled Country X N/A Country X Valid
Operating Mode Dialog Box
Operating Mode Fields
Field Description
Infrastructure is the default mode. Select Ad-hoc to enable the mobile computer to form its own local network where mobile computers communicate peer-to-peer without APs using a shared ESSID.
match the country in the options page or it must match the acquired country if 802.11d is enabled.Note that the 802.11d setting only applies to infrastructure profiles, not to Ad-hoc profiles.
Profile Regulatory Validity for Infrastructure Mode
Profile Country
Settings
Fusion Options
Country Settings
Country Code
Acquired from
Infrastructure
Regulatory
Validity
Enabled Country X N/A Country Y Invalid
Disabled Any Country Country Y N/A Valid
Disabled Country X Country X N/A Valid
Disabled Country X Country Y N/A Invalid
Loading...
+ 84 hidden pages