EasyManuals Logo
Home>Zebra>PDA>TC20

Zebra TC20 User Manual

Zebra TC20
171 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #104 background imageLoading...
Page #104 background image
Settings
104
2. Touch Network & Internet > Wi-Fi.
3. Slide the Wi-Fi switch to the On position.
4. Scroll to the bottom of the list and select Add network.
5. In the Network name text box, enter the name of the Wi-Fi network.
6. In the Security drop-down list, set the type of security to:
None
WEP
WPA/WPA2 PSK
802.1x EAP.
7. If the network security is None, touch Save.
8. If the network security is WEP or WPA/WPA2 PSK, enter the required password, and then touch Save.
9. If the network security is 802.1x EAP:
Touch the EAP method drop-down list and select PEAP, TLS, or TTLS.
Touch the Phase 2 authentication drop-down list and select an authentication method.
If required, touch CA certificate and select a Certification Authority (CA) certificate. Note: Certificates
are installed using the Security settings.
If required, touch User certificate and select a user certificate. Note: User certificates are installed
using the Security settings.
If required, in the Identity text box, enter the username credentials.
If desired, in the Anonymous identity text box, enter an anonymous identity username.
If required, in the Password text box, enter the password for the given identity.
NOTE: By default, the network Proxy is set to None and the IP settings is set to DHCP. See Configuring for a Proxy Server
for setting connection to a proxy server and see Configuring the Device to Use a Static IP Address for setting the device to
use a static IP address.
10.Touch Save. To connect to the saved network, touch and hold on the saved network and select Connect to
network.
11.Touch .
Configuring for a Proxy Server
A proxy server is a server that acts as an intermediary for requests from clients seeking resources from other
servers. A client connects to the proxy server and requests some service, such as a file, connection, web
page, or other resource, available from a different server. The proxy server evaluates the request according to
its filtering rules. For example, it may filter traffic by IP address or protocol. If the request is validated by the
filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf
of the client.
It is important for enterprise customers to be able to set up secure computing environments within their
companies, making proxy configuration essential. Proxy configuration acts as a security barrier ensuring that
the proxy server monitors all traffic between the Internet and the intranet. This is normally an integral part of
security enforcement in corporate firewalls within intranets.
To configure the device for a proxy server:

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Zebra TC20 and is the answer not in the manual?

Zebra TC20 Specifications

General IconGeneral
BrandZebra
ModelTC20
CategoryPDA
LanguageEnglish

Related product manuals