Zebra MC75 Mobile Computer Fusion 2.60 User Guide English

Wireless Fusion Enterprise Mobility Suite
User Guide for Version 2.60
Wireless Fusion Enterprise Mobility Suite
User Guide for Version 2.60
72E-113153-04
Rev. A
March 2015
© 2015 ZIH Corp and/or its affiliates. All rights reserved.
No part of this publication may be reproduced or used in any form, or by any electrical or mechanical means, without permission in writing from Zebra. This includes electronic or mechanical means, such as photocopying, recording, or information storage and retrieval systems. The material in this manual is subject to change without notice.
The software is provided strictly on an “as is” basis. All software, including firmware, furnished to the user is on a licensed basis. Zebra grants to the user a non-transferable and non-exclusive license to use each software or firmware program delivered hereunder (licensed program). Except as noted below, such license may not be assigned, sublicensed, or otherwise transferred by the user without prior written consent of Zebra. No right to copy a licensed program in whole or in part is granted, except as permitted under copyright law. The user shall not modify, merge, or incorporate any form or portion of a licensed program with other program material, create a derivative work from a licensed program, or use a licensed program in a network without written permission from Zebra. The user agrees to maintain Zebra’s copyright notice on the licensed programs delivered hereunder, and to include the same on any authorized copies it makes, in whole or in part. The user agrees not to decompile, disassemble, decode, or reverse engineer any licensed program delivered to the user or any portion thereof.
Zebra reserves the right to make changes to any software or product to improve reliability, function, or design.
Zebra does not assume any product liability arising out of, or in connection with, the application or use of any product, circuit, or application described herein.
No license is granted, either expressly or by implication, estoppel, or otherwise under any Zebra, intellectual property rights. An implied license only exists for equipment, circuits, and subsystems contained in Zebra products.

Revision History

Changes to the original manual are listed below:
Change Date Description
-01 Rev A 09/08 Initial release.
-02 Rev A 03/15 Zebra rebranding.
iii

Table of Contents

Revision History
About This Guide
Introduction ........................................................................................................................................... ix
Chapter Descriptions ............................................................................................................................ ix
Notational Conventions......................................................................................................................... x
Related Documents .............................................................................................................................. x
Service Information............................................................................................................................... xi
Chapter 1: Getting Started
Introduction .......................................................................................................................................... 1-1
Signal Strength Icon ............................................................................................................................ 1-2
Turning the WLAN Radio On and Off .................................................................................................. 1-3
Chapter 2: Find WLAN Application
Introduction .......................................................................................................................................... 2-1
Chapter 3: Manage Profiles Application
Introduction .......................................................................................................................................... 3-1
Changing Profiles ................................................................................................................................ 3-2
Editing a Profile .................................................................................................................................... 3-3
Creating a New Profile ......................................................................................................................... 3-3
Deleting a Profile ................................................................................................................................. 3-4
Ordering Profiles .................................................................................................................................. 3-4
Export a Profile .................................................................................................................................... 3-4
.................................................................................................................................... iii
Chapter 4: Profile Editor Wizard
Introduction .......................................................................................................................................... 4-1
Profile ID .............................................................................................................................................. 4-1
Operating Mode ................................................................................................................................... 4-2
Ad-Hoc ................................................................................................................................................. 4-4
Security Mode ...................................................................................................................................... 4-5
Authentication Type ............................................................................................................................. 4-6
Tunneled Authentication ...................................................................................................................... 4-7
User Certificate Selection .................................................................................................................... 4-9
User Certificate Installation ............................................................................................................ 4-9
Server Certificate Selection ........................................................................................................... 4-11
Server Certificate Installation ......................................................................................................... 4-11
User Name ..................................................................................................................................... 4-12
Password ............................................................................................................................................. 4-13
Advanced Identity ................................................................................................................................ 4-14
Credential Cache Options .................................................................................................................... 4-14
Encryption ............................................................................................................................................ 4-17
Hexadecimal Keys ......................................................................................................................... 4-18
Pass-phrase Dialog ........................................................................................................................ 4-20
IP Address Entry .................................................................................................................................. 4-21
Transmit Power .................................................................................................................................... 4-23
Battery Usage ...................................................................................................................................... 4-24
Chapter 5: Manage Certificates Application
Introduction .......................................................................................................................................... 5-1
Certificate Properties ........................................................................................................................... 5-2
Import a Certificate .............................................................................................................................. 5-3
Delete a Certificate .............................................................................................................................. 5-4
Chapter 6: Manage PACs Application
Introduction .......................................................................................................................................... 6-1
PAC Properties .................................................................................................................................... 6-2
Delete PAC .......................................................................................................................................... 6-2
Chapter 7: Options
Introduction .......................................................................................................................................... 7-1
Operating Mode Filtering ..................................................................................................................... 7-1
Regulatory Options .............................................................................................................................. 7-2
Band Selection ..................................................................................................................................... 7-3
System Options ................................................................................................................................... 7-3
Auto PAC Settings ............................................................................................................................... 7-4
Change Password ............................................................................................................................... 7-4
Export .................................................................................................................................................. 7-5
Chapter 8: Wireless Status Application
Introduction .......................................................................................................................................... 8-1
Signal Strength Window ................................................................................................................. 8-2
Current Profile Window .................................................................................................................. 8-3
Table of Contents vii
IPv4 Status Window ................................................................................................................. 8-4
Wireless Log Window .................................................................................................................... 8-5
Saving a Log ............................................................................................................................ 8-5
Clearing the Log ....................................................................................................................... 8-6
Versions Window ........................................................................................................................... 8-6
Chapter 9: Wireless Diagnostics Application
Introduction .......................................................................................................................................... 9-1
ICMP Ping Window ........................................................................................................................ 9-1
Graphs ........................................................................................................................................... 9-2
Trace Route Window ..................................................................................................................... 9-3
Known APs Window ....................................................................................................................... 9-3
Chapter 10: Log On/Off Application
Introduction .......................................................................................................................................... 10-1
User Already Logged In ....................................................................................................................... 10-1
No User Logged In ............................................................................................................................... 10-1
Chapter 11: Persistence
Chapter 12: Configuration Examples
Introduction .......................................................................................................................................... 12-1
EAP–FAST/MS Chap v2 Authentication .............................................................................................. 12-1
Glossary
Index

About This Guide

Introduction

This guide provides information about using the Wireless Applications software on a Zebra mobile computer.
NOTE Screens and windows pictured in this guide are samples and can differ from actual screens.

Chapter Descriptions

Topics covered in this guide are as follows:
Chapter 1, Getting Started provides information enabling the wireless radio.
Chapter 2, Find WLAN Application provides information about the Find WLAN application.
Chapter 3, Manage Profiles Application provides information about managing profiles.
Chapter 4, Profile Editor Wizard explains how to configure a profile.
Chapter 5, Manage Certificates Application explains how to manage certificates.
Chapter 6, Manage PACs Application explains how to manage PACs.
Chapter 7, Options explains how to configure the application options.
Chapter 8, Wireless Status Application describes the status indication.
Chapter 9, Wireless Diagnostics Application explains how to diagnose the wireless connection.
Chapter 10, Log On/Off Application explains how to log on and off the wireless network.
Chapter 11, Persistence explains how to configure persistence and describes registry settings.
Chapter 12, Configuration Examples provides examples for setting up various authentication and encryption
types.
x Wireless Fusion Enterprise Mobility Suite User Guide

Notational Conventions

The following conventions are used in this document:
Italics are used to highlight the following:
Chapters and sections in this and related documents
Dialog box, window and screen names
Icons on a screen.
Bold text is used to highlight the following:
Key names on a keypad
Button names on a screen or window.
Drop-down list and list box names
Check box and radio button names
bullets (•) indicate:
Action items
Lists of alternatives
Lists of required steps that are not necessarily sequential
Sequential lists (e.g., those that describe step-by-step procedures) appear as numbered lists.
NOTE This symbol indicates something of special interest or importance to the reader. Failure to read the note
will not result in physical harm to the reader, equipment or data.
CAUTION This symbol indicates that if this information is ignored, the possibility of data or material damage may
WARNING! This symbol indicates that if this information is ignored the possibility that serious personal

Related Documents

Enterprise Mobility Developer Kit for C (EMDK for C), available at: http://www.zebra.com/support.
ActiveSync 4.x software, available at: http://www.microsoft.com.
For the latest version of this guide and all guides, go to: http://www.zebra.com/support.
occur.
injury may occur.

Service Information

If you have a problem with your equipment, contact Zebra support for your region. Contact information is available
at: http://www.zebra.com/support
When contacting Zebra support, please have the following information available:
Serial number of the unit
Model number or product name
Software type and version number
Zebra responds to calls by email, telephone or fax within the time limits set forth in support agreements.
If your problem cannot be solved by Zebra Support, you may need to return your equipment for servicing and will
be given specific directions. Zebra is not responsible for any damages incurred during shipment if the approved
shipping container is not used. Shipping the units improperly can possibly void the warranty.
If you purchased your business product from a Zebra business partner, contact that business partner for support.
About This Guide xi
.
Chapter 1 Getting Started

Introduction

Wireless Local Area Networks (LANs) allow mobile computers to communicate wirelessly and send captured data
to a host device in real time. Before using the mobile computer on a WLAN, the facility must be set up with the
required hardware to run the wireless LAN and the mobile computer must be configured. Refer to the
documentation provided with the access points (APs) for instructions on setting up the hardware.
802.11d is enabled by default. When enabled, the AP must be configured the same in order to connect.
To configure the mobile computer, a set of wireless applications provide the tools to configure and test the wireless
radio in the mobile computer. The Wireless Application menu on the task tray provides the following wireless
applications:
Find WLANs
Manage Profiles
Manage Certs
Manage PACs
Options
Wireless Status
Wireless Diagnostics
Log On/Off
Enable/Disable Radio.
Tap the Signal Strength icon to display the Wireless Applications menu.
Figure 1-1
Wireless Applications Menu

Signal Strength Icon

The Signal Strength icon in the task tray indicates the mobile computer’s wireless signal strength as follows:
Table 1-1
Icon Status Action
Signal Strength Icons Descriptions
Excellent signal strength Wireless LAN network is ready to use.
Very good signal strength Wireless LAN network is ready to use.
Good signal strength Wireless LAN network is ready to use.
Fair signal strength Wireless LAN network is ready to use. Notify the network
Poor signal strength Wireless LAN network is ready to use. Performance may not be
administrator that the signal strength is only “Fair”.
optimum. Notify the network administrator that the signal strength is “Poor”.
Out-of-network range (not associated)
No wireless LAN network card detected
None No wireless LAN network card
detected or Wireless LAN disabled
No wireless LAN network connection. Notify the network administrator.
No wireless LAN network card detected, Wireless LAN disabled or radio disabled. Notify the network administrator.
No wireless LAN network card detected or Wireless LAN disabled or radio disabled. Notify the network administrator.
Turning the WLAN Radio On and Off
To turn the WLAN radio off tap the Signal Strength icon and select Disable Radio.
Getting Started 1 - 3
Figure 1-2
To turn the WLAN radio on tap the Signal Strength icon and select Enable Radio.
Figure 1-3
Disable Radio
Enable Radio
Chapter 2 Find WLAN Application

Introduction

Use the Find WLANs application to discover available networks in the vicinity of the user and mobile computer. To
open the Find WLANs application, tap the Signal Strength icon > Find WLANs. The Find WLANs window
displays.
Figure 2-1
The Find WLANs list displays:
Find WLANs Window
NOTE The Find WLANs display is limited to 32 items (ESSIDs or MAC addresses). A combination of up to 32
ESSIDs/APs may be displayed.
Manually enter valid ESSIDs not displayed in the
WLAN Networks - Available wireless networks with icons that indicate signal strength and security. The signal strength and encryption icons are described in Table 2-1 and Table 2-2.
Network Type - Type of network. 802.11(a), 802.11(b) or 802.11(g).
Channel - Channel on which the AP is transmitting.
Signal Strength - The signal strength of the signal from the AP.
Find WLANs window.
.
Table 2-1
Signal Strength Icon
Icon Description
Excellent signal
Very good signal
Good signal
Fair signal
Poor signal
Out of range or no signal
Table 2-2
Encryption Icon
Icon Description
No encryption. WLAN is an infrastructure network.
WLAN is an Ad-Hoc network.
WLAN access is secured and required configuration.
Tap-and-hold on a WLAN network to open a pop-up menu which provides two options: Connect and Refresh.
Select Refresh to refresh the WLAN list. Select Connect to create a WLAN profile from that network. This starts
the Profile Editor Wizard which allows you to set the values for the selected network. After editing the profile, the
mobile computer automatically connects to this new profile.
Chapter 3 Manage Profiles Application
WirelessOutofBoxMa gic

Introduction

The Manage Profiles application provides a list of user-configured wireless profiles. Define up to 32 profiles at any
one time. To open the Manage Profiles application, tap the Signal Strength icon > Manage Profiles.
Figure 3-1
Icons next to each profile identify the profile’s current state.
Table 3-1
Icon Description
No Icon Profile is not selected, but enabled.
Manage Profiles Window
Profile Icons
Profile is disabled.
Profile is cancelled. A cancelled profile is disabled until a connect or login function is performed through the configuration editor.
Profile is in use and describes an infrastructure profile not using encryption.
WirelessOutofBoxMagic
Table 3-1
Icon Description
The profiles are listed in priority order for use by the automatic Profile Roaming feature. Change the order by
moving profiles up or down. To edit existing profiles, tap and hold one in the list and select an option from the menu
to connect, edit, disable (enable), or delete the profile. (Note that the Disable menu item changes to Enable if the
profile is already disabled.)
Profile Icons (Continued)
Profile is in use and describes an infrastructure profile using encryption.
Profile is in use and describes an ad-hoc profile not using encryption.
Profile is in use and describes an ad-hoc profile using encryption.
Profile is not valid in the device current operating regulatory domain.
Figure 3-2

Changing Profiles

A completed profile is a set of configuration settings that can be used in different locations to connect to a wireless
network. Create different profiles to have pre-defined operating parameters available for use in various network
environments. When the WLAN Profiles window displays, existing profiles appear in the list.
Manage Profiles Context Menu
Manage Profiles Application 3 - 3
WirelessOutofBoxMagic
WirelessOutofBoxMagic
Figure 3-3
Tap and hold a profile and select Connect from the pop-up menu to set this as the active profile. Once selected,
the mobile computer uses the setting configured for the profile (i.e., authentication, encryption, ESSID, IP Config,
power consumption, etc.).
Manage Profiles

Editing a Profile

Tap and hold a profile and select Edit from the pop-up menu to display the Profile Wizard where the profile
settings are configured. See Introduction on page 3-1 for instruction on editing a profile.

Creating a New Profile

To create new profiles from the Manage Profiles window, tap-and-hold anywhere in this window.
Figure 3-4
Select Add to display the Profile Wizard wherein the settings for the new profile are configured, such as profile
name, ESSID, security, network address information, and the power consumption level. See Introduction on page
3-1 for instruction on creating a profile.
Manage Profiles - Add

Deleting a Profile

To delete a profile from the list, tap and hold the profile and select Delete from the pop-up menu. A confirmation
dialog box appears.

Ordering Profiles

Tap and hold a profile from the list and select Move Up or Move Down to order the profile. If the current profile
association is lost, the mobile computer attempts to associate with the first profile in the list, then the next, until it
achieves a new association.
NOTE Profile Roaming must be enabled in the Options application. See Chapter 7, Options.

Export a Profile

To export a profile to a registry file, tap and hold a profile from the list and select Export from the pop-up menu. The
Save As dialog box displays with the Application folder and a default name of WCS_PROFILE{profile GUID}.reg
(Globally Unique Identifier).
Figure 3-5
If required, change the name in the Name field and tap Save. A confirmation dialog box appears after the export
completes.
Save As Dialog Box
Chapter 4 Profile Editor Wizard

Introduction

Use the Profile Editor Wizard to create a new WLAN profile or edit an existing profile. If editing a profile, the fields

reflect the current settings for that profile. If creating a new profile, default values appear in the fields.
Navigate through the wizard using the Next and Back buttons. Tap X to quit. On the confirmation dialog box, tap
No to return to the wizard or tap Yes to quit and return to the Manage Profiles window. See Chapter 3, Manage
Profiles Application for instructions on navigating to and from the Profile Editor Wizard.

Profile ID

In the Profile ID dialog box in the Profile Editor Wizard, enter the profile name and the ESSID.
Figure 4-1
Table 4-1
Profile Name The name and (WLAN) identifier of the network connection. Enter a user friendly name for the
ESSID The ESSID is the 802.11 extended service set identifier. The ESSID is 32-character
Profile ID Dialog Box
Profile ID Fields
Field Description
mobile computer profile used to connect to either an AP or another networked computer. Example: The Public LAN.
(maximum) case sensitive string identifying the WLAN, and must match the AP ESSID for the mobile computer to communicate with the AP.
NOTE Two profiles with the same user friendly name are acceptable but not recommended.
Ta p Next. The Operating Mode dialog box displays.

Operating Mode

Use the Operating Mode dialog box to select the operating mode (Infrastructure or Ad-Hoc) and the country
location.
Figure 4-2
Table 4-2
Operating Mode Select Infrastructure to enable the mobile computer to transmit and receive data with an AP.
Country Country determines if the profile is valid for the country of operation. The profile country must
Operating Mode Dialog Box
Operating Mode Fields
Field Description
Infrastructure is the default mode. Select Ad Hoc to enable the mobile computer to form its own local network where mobile computers communicate peer-to-peer without APs using a shared ESSID.
match the country in the options page or it must match the acquired country if 802.11d is enabled.
Single Country Use: When the device is only used in a single country, set every profile country to Allow Any Country. In the Options > Regulatory dialog box (see Figure 7-2 on page 7-2), select the
specific country the device is used in, and deselect the Enable 802.11d option. This is the most common and efficient configuration, eliminating the initialization overhead associated with acquiring a country via 802.11d.
Profile Editor Wizard 4 - 3
Table 4-2
Country (Cont'd) Multiple Country Use:
Operating Mode Fields (Continued)
Field Description
When the device is used in more than one country, select the Enable 802.11d option in the Options > Regulatory dialog box (see Figure 7-2 on page 7-2). This eliminates the need for
reprogramming the country (in Options > Regulatory) each time the user enters a new country. However, this only works if the infrastructure (i.e., APs) supports 802.11d (older firmware versions on wireless infrastructures do not support 802.11d). When the Enable
802.11d option is selected, the Options > Regulatory > Country setting is not used for infrastructure WLANs. 802.11d feature is only valid for Infrastructure WLANs and not for Ad-hoc WLANs. Ad-hoc WLANs will use the country options and needs to match the profile. For a single profile that can be used in multiple countries, with infrastructure that supports
802.11d (including Zebra infrastructure), set the Profile Country to Allow Any Country. Under Options > Regulatory, select Enable 802.11d. The Options > Regulatory > Country setting is not used.
For a single profile that can be used in multiple countries, but with infrastructure that does not support 802.11d, set the profile country to Allow Any Country, and de-select (uncheck) Enable 802.11d. In this case, the Options > Regulatory > Country setting must always be set to the country the device is currently in. This configuration option is the most efficient and may be chosen for use with any infrastructure. However, the Options > Regulatory > Country setting must be manually changed when a new country is entered. Note that using a single profile in multiple countries implies that there is a common ESSID to connect to in each country. This is less likely than having unique ESSIDs in each country, this requires unique profiles for each country.
For additional efficiency when using multiple profiles that can be used in multiple countries, the country setting for each profile can be set to a specific country. If the current country (found via 802.11d or set by Options > Regulatory > Country when 802.11d is disabled) does not match the country set in a given profile, then that profile is disabled. This can make profile roaming occur faster. For example, if two profiles are created and configured for Japan, and two more profiles are created and configured for USA, then when in Japan only the first two profiles are active, and when in USA only the last two are active. If they had all been configured for Allow Any Country, then all four would always be active, making profile roaming less efficient.
Ta p Next. If Ad-Hoc mode was selected the Ad-Hoc Channel dialog box displays. If Infrastructure mode was
selected the Security Mode dialog box displays. See Security Mode on page 4-5 for instruction on setting up
authentication.
Loading...
+ 63 hidden pages