AML KDT750 Price Verification System User Manual
AML Computer hardware
This manual is related to the following products:
Table of contents
Document Outline
- About this Document
- Chapter 1: Introduction
- Chapter 2: Getting Started
- Chapter 3: Terminal Overview
- Chapter 4: Communications & Input
- Chapter 5: Wireless Networking
- Overview
- 802.11 Fallback
- Interference and Coexistence
- Encryption and Authorization
- Wireless Configuration
- Wireless Configuration Parameters
- Example Configurations
- Plain text connection (No Encryption, No Authorization, AP Broadcasting SSID)
- Plain text connection with hidden SSID
- Open WEP Encrypted with hidden SSID, WEP Keys in Text Format
- Exact Configuration as Above but with WEP Keys in Hex Format
- WPA/WPA2 with Pre-Shared Key (PSK)
- Exact Configuration as Above but with raw Pre-Shared Key (PSK)
- WPA/WPA2 Enterprise with EAP-PEAP/MSCHAPv2]
- WPA/WPA2 Enterprise with EAP-TLS and local certificates
- WPA/WPA2 Enterprise with EAP-TTLS (Tunneled TLS), no local certificates
- Cisco Lightweight EAP (LEAP) with dynamic WEP keys
- Chapter 6: Integrated Bar Code Scanner
- Chapter 7: Installed Software
- Chapter 8: Mechanical Integration & Mounting
- Appendix A: Technical Specifications
- Appendix B: Wireless Reference Table