Zebra WT41N0 Wearable Terminal Wireless Fusion Enterprise Mobility Suite User Guide for Version X2.00 English

WIRELESS FUSION ENTERPRISE MOBILITY SUITE
USER GUIDE FOR VERSION X2.00
Wireless Fusion Enterprise Mobility Suite
User Guide for Version X2.00
72E-1164268-02
March 2015
ii Wireless Fusion Enterprise Mobility Suite User Guide
No part of this publication may be reproduced or used in any form, or by any electrical or mechanical means, without permission in writing from Zebra. This includes electronic or mechanical means, such as photocopying, recording, or information storage and retrieval systems. The material in this manual is subject to change without notice.
The software is provided strictly on an “as is” basis. All software, including firmware, furnished to the user is on a licensed basis. Zebra grants to the user a non-transferable and non-exclusive license to use each software or firmware program delivered hereunder (licensed program). Except as noted below, such license may not be assigned, sublicensed, or otherwise transferred by the user without prior written consent of Zebra. No right to copy a licensed program in whole or in part is granted, except as permitted under copyright law. The user shall not modify, merge, or incorporate any form or portion of a licensed program with other program material, create a derivative work from a licensed program, or use a licensed program in a network without written permission from Zebra. The user agrees to maintain Zebra’s copyright notice on the licensed programs delivered hereunder, and to include the same on any authorized copies it makes, in whole or in part. The user agrees not to decompile, disassemble, decode, or reverse engineer any licensed program delivered to the user or any portion thereof.
Zebra reserves the right to make changes to any software or product to improve reliability, function, or design.
Zebra does not assume any product liability arising out of, or in connection with, the application or use of any product, circuit, or application described herein.
No license is granted, either expressly or by implication, estoppel, or otherwise under any Zebra, intellectual property rights. An implied license only exists for equipment, circuits, and subsystems contained in Zebra products.

Revision History

Changes to the original manual are listed below:
Change Date Description
-01 Rev. A 03/08/13 Initial release.
-02 Rev. A 03/30/15 Zebra rebranding.
iii
iv Wireless Fusion Enterprise Mobility Suite User Guide

TABLE OF CONTENTS

Revision History .............................................................................................................................. iii
About This Guide
Introduction ..................................................................................................................................... ix
Chapter Descriptions ...................................................................................................................... ix
Notational Conventions................................................................................................................... x
Related Documents ........................................................................................................................ x
Chapter 1: Getting Started
Introduction .................................................................................................................................... 1-1
Configuring the Infrastructure ........................................................................................................ 1-1
Fusion Overview ............................................................................................................................ 1-1
Windows Mobile Home Screen ................................................................................................ 1-2
Windows Classic Today Screen .............................................................................................. 1-2
Windows CE ............................................................................................................................ 1-2
Fusion Signal Strength Icon ........................................................................................................... 1-3
Fusion Functions ............................................................................................................................ 1-4
Enable/Disable Radio .............................................................................................................. 1-5
Hide Menu ................................................................................................................................ 1-5
Exit ........................................................................................................................................... 1-6
Fusion Help .............................................................................................................................. 1-6
Minimum Setup .............................................................................................................................. 1-6
Chapter 2: Find WLAN Application
Introduction .................................................................................................................................... 2-1
Chapter 3: Manage Profiles Application
Introduction .................................................................................................................................... 3-1
Connect to a Profile ....................................................................................................................... 3-2
Editing a Profile .............................................................................................................................. 3-3
vi Wireless Fusion Enterprise Mobility Suite User Guide
Creating a New Profile ................................................................................................................... 3-3
Deleting a Profile ........................................................................................................................... 3-3
Ordering Profiles ............................................................................................................................ 3-3
Export a Profile .............................................................................................................................. 3-3
Profile Roaming ............................................................................................................................. 3-4
Chapter 4: Profile Editor Wizard
Introduction .................................................................................................................................... 4-1
Profile Name .................................................................................................................................. 4-1
Operating Mode ............................................................................................................................. 4-2
Ad-hoc ........................................................................................................................................... 4-2
Security Mode ................................................................................................................................ 4-3
Authentication Type ....................................................................................................................... 4-5
Tunneled Authentication ................................................................................................................ 4-5
User Certificate Selection .............................................................................................................. 4-7
User Certificate Installation ...................................................................................................... 4-7
Server Certificate Selection ..................................................................................................... 4-9
Server Certificate Installation ................................................................................................... 4-10
User Name ............................................................................................................................... 4-11
Password ....................................................................................................................................... 4-11
Advanced Identity .......................................................................................................................... 4-12
Credential Cache Options .............................................................................................................. 4-13
Encryption ...................................................................................................................................... 4-15
Hexadecimal Keys ................................................................................................................... 4-17
Pass-phrase Dialog .................................................................................................................. 4-18
IPv4 Address Entry ........................................................................................................................ 4-19
Transmit Power .............................................................................................................................. 4-22
Battery Usage ................................................................................................................................ 4-23
Performance Settings .............................................................................................................. 4-24
Chapter 5: Manage Certificates Application
Introduction .................................................................................................................................... 5-1
Certificate Properties ..................................................................................................................... 5-2
Import a Certificate ........................................................................................................................ 5-3
Delete a Certificate ........................................................................................................................ 5-5
Chapter 6: Manage PACs Application
Introduction .................................................................................................................................... 6-1
PAC Properties .............................................................................................................................. 6-2
Delete PAC .................................................................................................................................... 6-2
Import PAC .................................................................................................................................... 6-3
Chapter 7: Options
Introduction .................................................................................................................................... 7-1
Op (Operating) Mode Filtering ....................................................................................................... 7-1
Regulatory ..................................................................................................................................... 7-2
Band/Channel Selection ................................................................................................................ 7-3
Table of Contents vii
802.11 Options ............................................................................................................................... 7-4
System Options .............................................................................................................................. 7-5
Auto PAC Settings ......................................................................................................................... 7-5
IPv6 ................................................................................................................................................ 7-6
Change Password .......................................................................................................................... 7-6
Import/Export ................................................................................................................................. 7-7
Data Management ......................................................................................................................... 7-8
Chapter 8: Wireless Status Application
Introduction .................................................................................................................................... 8-1
Signal Strength Window ........................................................................................................... 8-2
Current Profile Window ............................................................................................................ 8-3
IPv4 Status Window ................................................................................................................. 8-4
IPv6 Status Window ................................................................................................................. 8-5
Wireless Log Window .............................................................................................................. 8-7
Saving a Log ...................................................................................................................... 8-7
Clearing the Log ................................................................................................................. 8-8
Logos & Certifications Window ................................................................................................ 8-8
Versions Window ..................................................................................................................... 8-9
Chapter 9: Wireless Diagnostics Application
Introduction .................................................................................................................................... 9-1
ICMP Ping Window .................................................................................................................. 9-2
Graphs ..................................................................................................................................... 9-3
Trace Route Window ............................................................................................................... 9-3
Known APs Window ................................................................................................................. 9-4
Chapter 10: Log On/Off Application
Introduction .................................................................................................................................... 10-1
Logging On .................................................................................................................................... 10-2
Logging Off .............................................................................................................................. 10-3
Chapter 11: Configuration Persistence
Introduction .................................................................................................................................... 11-1
Exporting Fusion Configuration ...................................................................................................... 11-1
Export Data .............................................................................................................................. 11-2
Import Data .............................................................................................................................. 11-3
Returning to Factory Default Settings ............................................................................................ 11-4
Chapter 12: Configuration Examples
Introduction .................................................................................................................................... 12-1
EAP–FAST/MS Chap v2 Authentication ........................................................................................ 12-1
Chapter 13: No User Interface Features
Network Policy Configuration Service ............................................................................................ 13-1
viii Wireless Fusion Enterprise Mobility Suite User Guide
Glossary
Index

ABOUT THIS GUIDE

Introduction

This guide provides information about using the Fusion Wireless Companion software on a Zebra mobile computer.
NOTE Screens and windows pictured in this guide are samples and can differ from actual screens.
This guide describes the functionally using Windows Mobile operating system.

Chapter Descriptions

Topics covered in this guide are as follows:
Chapter 1, Getting Started provides an overview of the Fusion Wireless Companion software.
Chapter 2, Find WLAN Application provides information about the Find WLAN application.
Chapter 3, Manage Profiles Application provides information about managing profiles.
Chapter 4, Profile Editor Wizard explains how to configure a profile.
Chapter 5, Manage Certificates Application explains how to manage certificates.
Chapter 6, Manage PACs Application explains how to manage PACs.
Chapter 7, Options explains how to configure the Fusion options.
Chapter 8, Wireless Status Application describes how to get status about the wireless connection.
Chapter 9, Wireless Diagnostics Application describes tools to help diagnose problems with the wireless
connection.
Chapter 10, Log On/Off Application explains how to log on and off the wireless network.
Chapter 11, Configuration Persistence explains how to persist Fusion data and settings across a clean/cold
boot.
Chapter 12, Configuration Examples provides examples for setting up profiles with various authentication
and encryption types.
x Wireless Fusion Enterprise Mobility Suite User Guide
Chapter 13, No User Interface Features describes the features of Fusion that can be turned on and off
but do not have a standard Fusion user interface.

Notational Conventions

The following conventions are used in this document:
Italics are used to highlight the following:
Chapters and sections in this and related documents
Dialog box, window and screen names
Icons on a screen.
Bold text is used to highlight the following:
Key names on a keypad
Button names on a screen or window.
Drop-down list and list box names
Check box and radio button names
bullets (•) indicate:
Action items
Lists of alternatives
Lists of required steps that are not necessarily sequential
Sequential lists (e.g., those that describe step-by-step procedures) appear as numbered lists.
NOTE This symbol indicates something of special interest or importance to the reader. Failure to read the note
will not result in physical harm to the reader, equipment or data.
CAUTION This symbol indicates that if this information is ignored, the possibility of data or material damage may
WARNING! This symbol indicates that if this information is ignored the possibility that serious personal

Related Documents

Enterprise Mobility Developer Kit for C (EMDK for C), available at: http://www.zebra.com/support.
ActiveSync 4.x software, available at: http://www.microsoft.com.
occur.
injury may occur.
For the latest version of this guide and all guides, go to: http://www.zebra.com/support.

CHAPTER 1 GETTING STARTED

Introduction

Each Zebra mobile computer has a wireless local area network (WLAN) interface. This WLAN interface is managed by the Fusion Wireless Companion application. The software allows the user to configure and control the wireless radio in order to securely connect to the WLAN infrastructure. This guide enables the user to configure the mobile computer so that it can connect properly to a WLAN. This guide describes how to use the Fusion software.

Configuring the Infrastructure

WLANs allow mobile computers to communicate wirelessly. Before using the mobile computer on a WLAN, the facility must be set up with the required hardware to run the WLAN (sometimes known as infrastructure). The infrastructure and the mobile computer must both be properly configured to enable this communication.
Refer to the documentation provided with the infrastructure (access points (APs), access ports, switches, Radius servers, etc.) for instructions on how to set up the infrastructure.
Once you have set up the infrastructure to enforce your chosen WLAN security scheme, use the Fusion software to configure the mobile computer to match.

Fusion Overview

The Fusion software contains applications with which to create wireless profiles. Each profile specifies the security parameters to use for connecting to a particular WLAN as identified by its ESSID. The Fusion software also allows the user to control which profile out of a set of profiles is used to connect. Other Fusion applications allow the user to monitor the status of the current WLAN connection and to invoke diagnostic tools for troubleshooting.
The Fusion applications are accessed differently depending upon the operating system configuration, Windows Mobile 6.5, by default, supports a Windows Home screen as well as the classic Mobile 6.1 Today screen.
1 - 2 Wireless Fusion Enterprise Mobility Suite User Guide
Fusion Plug-in
Fusion Signal Strength icon
ESSID
Fusion Tile Tap to open Access Fusion applications
Tap to open the Log
On/Off Application
Fusion Signal Strength icon

Windows Mobile Home Screen

When the Windows Mobile Home screen is configured, a Fusion plug-in displays on the Home screen to provide information about signal strength and profile name.
Figure 1-1
Tap the Fusion tile to open the Wireless Launcher window.
Windows Mobile Home Screen with Fusion Plug-in

Windows Classic Today Screen

When the Windows Mobile Classic Today screen is configured and Fusion is managing the WLAN, a Fusion signal strength icon appears in the Task tray.
Figure 1-2
Windows Mobile Classic Today Screen with Fusion

Windows CE

A Fusion signal strength icon appears in the Task tray.
Getting Started 1 - 3

Fusion Signal Strength icon

Figure 1-3
Select the icon to open the Wireless Launcher menu.
Windows CE Screen
Fusion Signal Strength Icon
The shape and color of the Signal Strength icon provides information about the received wireless signal strength for the WLAN connection. Table 1-1 describes the different icons and their meanings.
Table 1-1
Fusion
Icon
Signal Strength Icon Descriptions
Status Description
Excellent signal strength WLAN network is ready to use.
Very good signal strength WLAN network is ready to use.
Good signal strength WLAN network is ready to use.
Fair signal strength WLAN network is ready to use. Notify the network
administrator that the signal strength is only “Fair”.
Poor signal strength WLAN network is ready to use. Performance may not be
Out-of-network range (not associated)
The WLAN radio is disabled. The WLAN radio is disabled. To enable, choose Enable Radio
None The Wireless Launcher
application was exited.
optimum. Notify the network administrator that the signal strength is “Poor”.
No WLAN network connection. Notify the network administrator.
from the Wireless Applications menu.
The Wireless Launcher application has been closed. See the Fusion Functions paragraphs below for how to restart the Wireless Launcher.
1 - 4 Wireless Fusion Enterprise Mobility Suite User Guide

Fusion Functions

Tap the Signal Strength icon or Fusion tile or tap Start > Wireless Companion > Wireless Launcher icon to display the Wireless Launcher menu.
Figure 1-4
Many of the items in the menu invoke one of the Fusion applications. These menu items and their corresponding applications are summarized in Table 1-2.
Table 1-2
Find WLANs Invokes the Find WLANs application which displays a list of the WLANs available
Manage Profiles Invokes the Manage Profiles application (which includes the Profile Editor
Manage Certs Invokes the Certificate Manager application which allows you to manage
Manage PACs Invokes the PAC Manager application which helps you manage the list of
Options Invokes the Options application which allows you to configure the Fusion option
Wireless Status Invokes the Wireless Status application which allows you to view the status of the
Wireless Launcher Menu
Supported Applications
Application Description
in your area.
Wizard) to manage and edit your list of WLAN profiles.
certificates used for authentication.
Protected Access Credentials used with EAP-FAST authentication.
settings.
current wireless connection.
Wireless Diagnostics Invokes the Wireless Diagnostics application which provides tools with which to
diagnose problems with the wireless connection.
Log On/Off Invokes the Network Login dialog which allows you to log on to a particular profile
or to log off from the currently active profile.
Fusion Help Invokes Fusion Help application which provides on-device Fusion Help (Windows
Mobile only).
Each of the applications have a chapter devoted to it in this guide.
Additional Wireless Launcher menu entries include:
Getting Started 1 - 5
Classic Home Screen
Windows Mobile Home Screen Windows CE Screen
Classic Home Screen
Windows Mobile Home Screen
Windows CE Screen

Enable/Disable Radio

Hide Menu

Exit.
Enable/Disable Radio
To turn the WLAN radio off, tap the Signal Strength icon and select Disable Radio.tap the Fusion tile or tap Start > Wireless Companion > Wireless Launcher icon and select Disable Radio.
Figure 1-5
To turn the WLAN radio on, tap the Fusion tile or tap Start > Wireless Companion > Wireless Launcher icon and select Enable Radio.
Figure 1-6
Also note that the radio may be enabled or disabled using the Wireless Manager screen on Windows Mobile devices.
Disable Radio
Enable Radio
Hide Menu
To hide the menu tap Hide in the menu.
1 - 6 Wireless Fusion Enterprise Mobility Suite User Guide

Exit

Ta p Exit to close the menu and exit the Wireless Launcher application. A dialog appears to confirm exiting the Wireless Launcher application. Tap Yes to exit. This closes the Wireless Launcher application and removes the Signal Strength icon from the screen.
To restart the Wireless Launcher application and redisplay the Signal Strength icon:
1. Ta p Start > Programs > Wireless Companion icon > Wireless Launch icon.
2. Ta p ok twice to close the windows.
3. The Signal Strength icon appears on the screen.

Fusion Help

On Windows Mobile devices, to access the on-device Fusion Help tap Start > Wireless Companion > Fusion Help.

Minimum Setup

Below is a list of the minimum effort to achieve a wireless connection. Note that there are many discrete nuances that may affect the performance of your wireless connection that might be missed if you do not consider them carefully.
You will need to create a profile. It is recommended that you read the profile editor chapter.
1. Find out from your IT administrator what the connection settings should be (Extended Service Set Identifier
(ESSID), Enterprise or Personal, authentication type, tunnel type, certificate requirements, Access Credentials
2. Create the profile using the information provided by the IT administrator.
3. Enter the Manage Profile screen, select the profile (press and hold), and select the Connect option in the
context menu that appears.
(PAC) requirements). Note that not all of the items listed may be relevant.
Protected

CHAPTER 2 FIND WLAN APPLICATION

Introduction

Use the Find WLANs application to discover available networks in the vicinity of your and mobile computer. To open the Find WLANs application, tap the Signal Strength icon > Find WLANs. The Find WLANs window displays.
Figure 2-1
The Find WLANs list displays:
Find WLANs Window
WLAN Networks - Available wireless networks, (both infrastructure and Ad-hoc) with icons that indicate signal strength and encryption. The signal strength and encryption icons are described in Table 2-1 and
Table 2-2.
Network Type - Type of network. 802.11(a), 802.11(b), 802.11(g) or 802.11(n).
Channel - Channel on which the AP/Ad-hoc peer is transmitting.
Signal Strength - The signal strength of the signal from the AP/Ad-hoc peer.
2 - 2 Wireless Fusion Enterprise Mobility Suite User Guide
.
Table 2-1
Signal Strength Icon
Icon Description
Excellent signal
Very good signal
Good signal
Fair signal
Poor signal
Out of range or no signal
Table 2-2
Encryption Icon
Icon Description
No encryption. WLAN is an infrastructure network.
WLAN is an Ad-hoc network.
WLAN uses encryption. WLAN is an infrastructure network.
Tap-and-hold on a WLAN network to open a pop-up menu which provides three options: Connect to, Create profile and Refresh.
Figure 2-2
Find WLANs Menu
NOTE The number of WLANs (ESSIDs) that can be detected by the wireless radio at one time is limited. If you
have a large number of WLANs active in your area, the Find WLANs window may not display them all.
The scan triggered by Find WLAN is at a lower priority compared to a roam scan. If the device is attempting to roam then a Find WLAN done at the exact same time may result in showing only the currently connected AP. Redoing the Find WLAN command shows the proper full results.
If you do not see your ESSID, try a Refresh. If your ESSID is still not displayed and you wish to create or connect to a profile for it, you will need to use the Manage Profiles application.
Select Connect to to view the list of existing profiles matching the select ESSID. The mobile computer connects to the given profile upon selection.
Find WLAN Application 2 - 3
Select Create profile to create a new WLAN profile for that network. This starts the Profile Editor Wizard which allows you to configure the security parameters that your mobile computer will use for the selected network. After editing the profile, the mobile computer automatically connects to this new profile.
NOTE A warning displays when connecting to an unsecure (or open) network via the Find WLANs application.
For open WLANs, the profile’s settings will take on automatically generated default values. If you wish to manually configure the settings, uncheck the Use Default configuration checkbox.
Figure 2-3
Warning Notice
Select Refresh to refresh the WLAN list.
2 - 4 Wireless Fusion Enterprise Mobility Suite User Guide
CHAPTER 3 MANAGE PROFILES
WirelessOutofBoxMagic
APPLICATION

Introduction

A profile is a set of operating parameters that define how the mobile computer will connect to a specific WLAN. Create different profiles for use in different network environments. The Manage Profiles application displays the list of user-created wireless profiles. You may have a maximum of 32 profiles at any one time. To open the Manage Profiles application, tap the Signal Strength icon > Manage Profiles.
out
Figure 3-1
Icons next to each profile identify the profile’s current state.
Table 3-1
Icon Description
No Icon Profile is not selected, but enabled.
Manage Profiles Window
Profile Icons
Profile is disabled.
Profile is cancelled. A cancelled profile is disabled until you connect to it, either by selecting Connect from the pop-up menu, or by using the Log On/Off application.
3 - 2 Wireless Fusion Enterprise Mobility Suite User Guide
Wire
WirelessOutof
Table 3-1
Profile Icons (Continued)
Icon Description
Profile is in use and describes an infrastructure profile not using security.
Profile is in use and describes an infrastructure profile using security.
Profile is in use and describes an ad-hoc profile not using security.
Profile is in use and describes an ad-hoc profile using security.
Profile is not valid in the regulatory domain in which the device is currently operating.
You can perform various operations on the profiles in the list. To operate on an existing profile, tap and hold it in the list and select an option from the menu to connect, edit, disable (enable), or delete the profile. (Note that the Disable menu item changes to Enable if the profile is already disabled.)
Figure 3-2

Connect to a Profile

Tap and hold a profile and select Connect from the pop-up menu to set this as the active profile.
Figure 3-3
Manage Profiles Context Menu
Manage Profiles - Connect
Once selected, the mobile computer uses the settings configured in the profile (i.e., authentication, encryption,
Wire
ESSID, IP Config, power consumption, etc.) to connect to a WLAN.

Editing a Profile

Tap and hold a profile and select Edit from the pop-up menu.This will invoke the Profile Wizard where the profile settings are configured.

Creating a New Profile

To create a new profile tap and hold anywhere in the Manage Profiles window and select Add from the pop-up menu.
Manage Profiles Application 3 - 3
Figure 3-4
Selecting Add invokes the Profile Wizard wherein the settings for the new profile are configured, such as profile name, ESSID, security, network address information, and the power consumption level.
Manage Profiles - Add

Deleting a Profile

To delete a profile from the list, tap and hold the profile and select Delete from the pop-up menu. A confirmation dialog box appears.

Ordering Profiles

The profiles are listed in priority order for use by the automatic Profile Roaming feature (see Profile Roaming below). Change the order by moving profiles up or down. Tap and hold a profile from the list and select Move Up or Move Down from the pop-up menu.

Export a Profile

To export a profile to a registry file, tap and hold a profile from the list and select Export from the pop-up menu. The Save As dialog box displays with the Application folder and a default name of WCS_PROFILE{profile GUID}.reg (Globally Unique Identifier).
3 - 4 Wireless Fusion Enterprise Mobility Suite User Guide
Figure 3-5
If required, change the name in the Name field and tap Save. A confirmation dialog box appears after the export completes.
Save As Dialog Box

Profile Roaming

Profile Roaming attempts to automatically select and connect to a profile from the profile list displayed in the Manage Profiles window. The Profile Roaming algorithm uses the order of the profiles in the profile list to determine the order in which profiles are tried.
NOTE Profile Roaming must be enabled in the Options application. See Chapter 7, Options.
The Profile Roaming algorithm makes two passes through the profile list. The first pass attempts to connect only to profiles that specify ESSIDs that can be detected by the wireless radio. If no connection is made, a second pass through the list is performed attempting to connect to those profiles that were not tried in the first pass. The Profile Roaming algorithm will only attempt to connect to a profile for which it is not necessary to prompt the user for credentials (i.e., username and password). This includes:
A profile that does not require credentials.
A device profile. A device profile is one in which the username and password have been pre-entered directly into the profile. (A profile with the username specified but with the password field left empty is still considered a device profile since an empty password is considered a valid password.)
A user profile with cached credentials. A user profile is one in which the username and password have not been pre-entered into the profile. A profile has cached credentials if the user has entered credentials for the profile via the Network Login dialog. When a profile has cached credentials, the user is said to have logged on to the profile. See Chapter 10, Log On/Off Application for more information.
The Profile Roaming algorithm will not attempt to connect to:
A profile that specifies EAP-GTC for its Tunnel Authentication Type and Token (as opposed to Static) for its password type. See Tunneled Authentication on page 4-5 for more information.
A user profile without cached credentials.
A user profile that has cached credentials but that also has the At-Connect option enabled. See
Credential Cache Options on page 4-13 for more information.
Manage Profiles Application 3 - 5
A device profile that has cached credentials because the user has logged on to it (called a user-override profile), but that also has the At-Connect option enabled.
A profile that has been disabled.
A profile that has been cancelled.
The Profile Roaming algorithm is invoked whenever the mobile computer becomes disconnected (disassociated) from the current WLAN.
3 - 6 Wireless Fusion Enterprise Mobility Suite User Guide

CHAPTER 4 PROFILE EDITOR WIZARD

Introduction

Use the Profile Editor Wizard to create a new WLAN profile or edit an existing profile. If editing a profile, the fields reflect the current settings for that profile. If creating a new profile, default values appear in the fields.
Navigate through the wizard using the Next and Back buttons. An indicator in the bottom left corner tracks the number of pages traversed and total number of pages required to complete the current profile configuration. Ta p X or the Cancel button to quit. On the confirmation dialog box, tap No to return to the wizard or tap Yes to quit and return to the Manage Profiles window. See Chapter 3, Manage Profiles Application for instructions on navigating to and from the Profile Editor Wizard.

Profile Name

In the Profile Name dialog box in the Profile Editor Wizard, enter the profile name and the ESSID.
Figure 4-1
Profile Name Dialog Box
4 - 2 Wireless Fusion Enterprise Mobility Suite User Guide
Table 4-1
Profile Name The user-friendly name you wish to give the profile. The profile name is limited to 64
ESSID The ESSID is the 802.11 extended service set identifier. The ESSID is a 32-character
Ta p Next. The Operating Mode dialog box displays.
Profile Name Fields
Field Description
NOTE Two profiles with the same user friendly name are acceptable but not recommended.

Operating Mode

Use the Operating Mode dialog box to select the operating mode (Infrastructure or Ad-hoc) and the country location.
characters. Example: The Public LAN.
(maximum) case sensitive string identifying the WLAN, and must match the AP ESSID for the mobile computer to communicate with the AP.
Figure 4-2
Table 4-2
Ta p Next. If Ad-hoc mode was selected the Ad-hoc Channel dialog box displays. If Infrastructure mode was selected the Security Mode dialog box displays. See Encryption on page 4-15 for instruction on setting up authentication.

Ad-hoc

Use the Ad-hoc Channel dialog box to configure the required information to create an Ad-hoc profile. This dialog box does not appear if you selected Infrastructure mode.
1. Select a channel number from the Channel drop-down list.
Operating Mode Dialog Box
Operating Mode Fields
Field Description
Operating Mode Select Infrastructure to enable the mobile computer to transmit and receive data with an
AP. Infrastructure is the default mode. Select Ad-hoc to enable the mobile computer to form its own local network where mobile computers communicate peer-to-peer without APs using a shared ESSID.
Loading...
+ 81 hidden pages