Configuring the Pocket PC

Total Page:16

File Type:pdf, Size:1020Kb

Configuring the Pocket PC

CIS 632 Configuring the Pocket PC for WoWnet Spring, 2009

You must configure your Pocket PC with the proper certificate and WLAN settings before it can be connected to the WLAN. You need to copy the correct certificate file to the Pocket PC. This procedure assumes the use of ActiveSync® connection established using a docking cradle, Infrared, or Bluetooth connection.

Import the certificate to the Pocket PC Note: Feb. 5, 2009—the CA (certification authority) is VeriSign Class 3 Secure Server CA

1. Go to my website and download the VeriSign certificate. 2. Transfer the certificate to the PDA (you could use the cradle and synch software to do this). 3. On the PDA, tap on the transferred cert to install it. 4. Make sure it is installed by viewing all root certs on the device by selecting Settings>System>Certificates, and then clicking the Root tab. You should see two certificates with the name “Verisign Trust Network”.

Configure the 802.1X WLAN settings on the Pocket PC

1. Make sure the WLAN adapter is enabled on the deviceStart > IPAQ Wireless >-- this takes you to the iPAQ Wireless screen. Now tap “ALL ON”. 2. In the iPAQ Wireless screen, tap “Settings”. 3. In the “Settings” screen, tap “Add New…” 4. Type in “4csuuseonly” as your network name and select “The Internet” in the “connects to” option. Make sure the ad-hoc option is not checked. 5. At the bottom, select the “Network Key” tab and select the following options: a. Authentication: Open b. Data Encryption: WEP c. Check: The key is automatically provided 6. At the bottom, select the “802.1x” tab and select the following options: a. Check: Use IEEE 802.1x network access control b. EAP type: PEAP 7. Tap OK to close the Settings screen. 8. When prompted to enter domain credentials to connect to the WLAN, type your name (your CSU ID), your password, and CSUNET as your domain. 9. You should NOT select the Save Password option since we don’t have a strong security mechanism, such as fingerprint scanning or strong password access, to protect the device from unauthorized use.

Recommended publications