Intermec Technologies DRCB DRCB User Manual ck32um

Intermec Technologies Corporation DRCB ck32um

User Manual

CK32 I-SafeHandheld ComputerUser’s Manual
CK32 I-SafeHandheld ComputerUser’s Manual
ii CK32 I-Safe Handheld Computer User’s ManualIntermec Technologies CorporationWorldwide Headquarters6001 36th Ave.W.Everett, WA 98203U.S.A.www.intermec.comThe information contained herein is provided solely for the purpose of allowing customers to operate and service Intermec-manufactured equipment and is not to be released, reproduced, or used for any other purpose without written permission of Intermec Technologies Corporation.Information and specifications contained in this document are subject to change without prior noticed and do not represent a commitment on the part of Intermec Technologies Corporation.© 2007 by Intermec Technologies Corporation. All rights reserved.The word Intermec, the Intermec logo, Norand, ArciTech, Beverage Routebook, CrossBar, dcBrowser, Duratherm, EasyADC, EasyCoder, EasySet, Fingerprint, i-gistics, INCA (under license), Intellitag, Intellitag Gen2, JANUS, LabelShop, MobileLAN, Picolink, Ready-to-Work, RoutePower, Sabre, ScanPlus, ShopScan, Smart Mobile Computing, SmartSystems, TE 2000, Trakker Antares, and Vista Powered are either trademarks or registered trademarks of Intermec Technologies Corporation.There are U.S. and foreign patents as well as U.S. and foreign patents pending.Wi-Fi is a registered certification mark of the Wi-Fi Alliance.Microsoft, Windows, and the Windows logo are registered trademarks of Microsoft Corporation in the United States and/or other countries.Bluetooth is a trademark of Bluetooth SIG, Inc., U.S.A.
ContentsCK32 I-Safe Handheld Computer User’s Manual iiiContentsBefore You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viiSafety Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viiGlobal Services and Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  viiiWarranty Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  viiiWeb Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  viiiTelephone Support  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ixWho Should Read This Manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ixRelated Documents  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xOther Copyright Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xPatent Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  xi1 Using the CK32 I-Safe Handheld Computer . . . . . . . . . . . . . . . . 1Introducing the CK32 I-Safe Handheld Computer. . . . . . . . . . . . . . . . . . . . . . . . . . . 2Using the Battery  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4Charging and Installing the Battery  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5Maximizing Battery Life . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6Checking the Battery Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6Understanding the Low Battery Warnings  . . . . . . . . . . . . . . . . . . . . . . . . . . 7Using the Keypad . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8Using the Color-Coded Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10Capitalizing All Characters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11Using the Power Button . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11Understanding the Status Lights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12Using the Touch Screen  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14Using the Stylus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15Aligning the Screen. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15About the Audio System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16Understanding the Audio Feedback. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16Scanning Bar Codes  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18Enabling or Disabling Symbologies  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19Scanning a Bar Code Label to Verify Scanner Operation  . . . . . . . . . . . . . . 19
Contentsiv CK32 I-Safe Handheld Computer User’s Manual2 Understanding Windows Mobile . . . . . . . . . . . . . . . . . . . . . . . . . . .  23Understanding Windows Mobile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  24Finding Information in Windows Mobile . . . . . . . . . . . . . . . . . . . . . . . . .  24Learning the Basic Skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  25Using the Today Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  25Accessing Programs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  26Closing an Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  26Using the Navigation Bar and the Command Bar. . . . . . . . . . . .  26Using Pop-Up Menus. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  27Entering Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  27Using Transcriber . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  29Finding and Organizing Information . . . . . . . . . . . . . . . . . . . . .  30Customizing the CK32 I-Safe . . . . . . . . . . . . . . . . . . . . . . . . . . .  30Using Microsoft ActiveSync. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  32Using Internet Explorer Mobile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  343 Configuring the CK32 I-Safe. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  35Configuring the Operating Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  36Configuring the CK32 I-Safe Using Intermec Settings  . . . . . . . . . . . . . . .  36Remotely Configuring the CK32 I-Safe Using SmartSystems Foundation .  37Setting Up Ethernet Communications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  37Setting Up Bluetooth Communications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  39Configuring Bluetooth Communications for Wireless Printing . . . . . . . . .  41Creating an Application That Lets You Print Wirelessly . . . . . . .  41Selecting the Current Wireless Printer on the CK32 I-Safe . . . . .  42Connecting to a Bluetooth Audio Device  . . . . . . . . . . . . . . . . . . . . . . . . .  45Setting Up 802.11 Radio Communications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  45Configuring the Network Parameters for a TCP/IP Network  . . . . . . . . . .  46Configuring the Network Parameters for a UDP Plus Network. . . . . . . . .  47Checking the Status of Your Wireless Connection. . . . . . . . . . . . . . . . . . .  47Using ISpyWiFi. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  48Starting the Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  48ISpyWiFi  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  49WiFi Scan. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  51Supplicant. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  52Ping  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  54
ContentsCK32 I-Safe Handheld Computer User’s Manual vSupplicant Logging  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55Configuring Security on the CK32 I-Safe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56Understanding the Wireless Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57Using WPA Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57Using Static WEP Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58Using 802.1x Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59Using LEAP Security  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59Choosing Between Funk and Microsoft Security  . . . . . . . . . . . . . . . . . . . . 60Configuring Funk Security Using Intermec Settings  . . . . . . . . . . 60Configuring Funk Security Using the Profile Wizard. . . . . . . . . . 65Configuring EAP-FAST with Profile Wizard . . . . . . . . . . . . . . . . 72Configuring Microsoft Security . . . . . . . . . . . . . . . . . . . . . . . . . . 73Loading a Certificate  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76Disabling Security  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 794 Developing and Installing Applications . . . . . . . . . . . . . . . . . . . 81Developing Applications for the CK32 I-Safe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82Developing a New Application Using the Intermec Developer Library . . . . 82Developing a Web-Based Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83Converting a Trakker Antares Application for the CK32 I-Safe  . . . . . . . . . 83Installing Applications on the CK32 I-Safe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84Installing Applications Using SmartSystems Foundation. . . . . . . . . . . . . . . 85Installing Applications Using Microsoft ActiveSync . . . . . . . . . . . . . . . . . . 85Installing Applications Using Wavelink Avalanche  . . . . . . . . . . . . . . . . . . . 87Launching An Application Automatically . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90RunAutoRun . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90AutoExec  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91AutoRun. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93AutoCopy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95AutoReg . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96AutoCab. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 975 Troubleshooting and Maintenance. . . . . . . . . . . . . . . . . . . . . . . . . 99Upgrading the CK32 I-Safe Using SmartSystems . . . . . . . . . . . . . . . . . . . . . . . . . . 100Contacting Product Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103Troubleshooting the CK32 I-Safe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104Problems While Operating the CK32 I-Safe. . . . . . . . . . . . . . . . . . . . . . . 104
vi CK32 I-Safe Handheld Computer User’s ManualProblems While Configuring Security . . . . . . . . . . . . . . . . . . . . . . . . . . .  106Problems with Wireless Connectivity  . . . . . . . . . . . . . . . . . . . . . . . . . . .  107Resetting Your Computer  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  110Preferred Reset Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  110Secondary Reset Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  110Performing a Clean Boot. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  111Cleaning the Scanner Window, Screen, and Computer . . . . . . . . . . . . . . . . . . . . .  111Cleaning the Scanner Window and Screen  . . . . . . . . . . . . . . . . . . . . . . .  112Cleaning the Handle and Computer . . . . . . . . . . . . . . . . . . . . . . . . . . . .  112A Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  115Physical and Environmental Specifications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  116Physical Dimensions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  116Weight . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  116Power Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  116Electrical Specifications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  116Temperature and Humidity Specifications . . . . . . . . . . . . . . . .  116LCD Touch Screen Specifications. . . . . . . . . . . . . . . . . . . . . . .  116Keypad Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  117Bar Code Symbologies  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  117Linear Imager Reading Distances . . . . . . . . . . . . . . . . . . . . . . .  118Accessories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  122AN1 Communications Adapter (P/N 871-223-xxx) . . . . . . . . .  122AC11 Quad Battery Charger (P/N 852-914-xxx) . . . . . . . . . . .  122Handle (P/N 714-625-xxx). . . . . . . . . . . . . . . . . . . . . . . . . . . .  122Hand Strap (P/N 825-183-xxx)  . . . . . . . . . . . . . . . . . . . . . . . .  122Carrying Strap Kit (P/N 825-186-xxx) . . . . . . . . . . . . . . . . . . .  123AB6 Battery Pack (P/N 318-021-xxx). . . . . . . . . . . . . . . . . . . .  123Tethered Stylus (P/N 203-828-xxx) . . . . . . . . . . . . . . . . . . . . .  123Battery Eliminator (P/N 714-619-xxx) . . . . . . . . . . . . . . . . . . .  123Power Supply (P/N 851-061-xxx). . . . . . . . . . . . . . . . . . . . . . .  123Screen Protector (P/N 346-065-004)  . . . . . . . . . . . . . . . . . . . .  123Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  125
Before You BeginCK32 I-Safe Handheld Computer User’s Manual viiBefore You Begin This section provides you with safety information, technical support information, and sources for additional product information.Safety Information Your safety is extremely important. Read and follow all warnings and cautions in this document before handling and operating Intermec equipment. You can be seriously injured, and equipment and data can be damaged if you do not follow the safety warnings and cautions.This section explains how to identify and understand dangers, warnings, cautions, and notes that are in this document. You may also see icons that tell you when to follow ESD procedures and when to take special precautions for handling optical parts. A warning alerts you of an operating procedure, practice, condition, or statement that must be strictly observed to avoid death or serious injury to the persons working on the equipment.A caution alerts you to an operating procedure, practice, condition, or statement that must be strictly observed to prevent equipment damage or destruction, or corruption or loss of data.Note: Notes either provide extra information about a topic or contain special instructions for handling a particular condition or set of circumstances.
Before You Beginviii CK32 I-Safe Handheld Computer User’s ManualGlobal Services and SupportWarranty InformationTo understand the warranty for your Intermec product, visit the Intermec web site at www.intermec.com and click Service & Support > Warranty.Web SupportVisit the Intermec web site at www.intermec.com to download our current manuals (in PDF). To order printed versions of the Intermec manuals, contact your local Intermec representative or distributor.Visit the Intermec technical knowledge base (Knowledge Central) at intermec.custhelp.com to review technical information or to request technical support for your Intermec product.• The Intermec Models CK32 I-Safe, AB6 Battery Pack, AN1 Communications Adapter, and AC11 Battery Charger contain no user serviceable components. Return these models ONLY to Intermec Authorized Service Centers for Repair. Intrinsic Safety Certifications and Warranties will be void if these models are opened or serviced at locations not certified by Intermec.• Only Intermec provided spare parts should be used in the repair of the CK32 I-Safe and accessory products.• Immediately remove from service any product that exhibits physical damage.• Wired connections to the CK32 I-Safe must only be made through a model AN1 Communications Adapter.• Verify that the CK32 I-Safe is appropriately rated for your hazardous location before use. Consult your Safety Department for assistance.• Use of any accessories not supplied and approved by Intermec could compromise safety.
Before You BeginCK32 I-Safe Handheld Computer User’s Manual ixTelephone SupportThese services are available from Intermec.Outside the U.S.A. and Canada, contact your local Intermec representative. To search for your local representative, from the Intermec web site, click Contact.Who Should Read This ManualThe CK32 I-Safe Handheld Computer User’s Manual is for the person who is responsible for installing, configuring, and maintaining the CK32 I-Safe. Before you work with the CK32 I-Safe, you should be familiar with your network and general networking terms, such as IP address.Services DescriptionIn the USA and Canada call 1-800-755-5505 and choose this optionOrder Intermec products• Place an order.• Ask about an existing order.1 and then choose 2Order Intermec mediaOrder printer labels and ribbons.1 and then choose 1Order spare partsOrder spare parts. 1 or 2 and then choose 4Te c hn i ca l  SupportTalk to technical support about your Intermec product.2 and then choose 2Service • Get a return authorization number for authorized service center repair.• Request an on-site repair technician.2 and then choose 1Service contracts• Ask about an existing contract.• Renew a contract.• Inquire about repair billing or other service invoicing questions.1 or 2 and then choose 3
Before You Beginx CK32 I-Safe Handheld Computer User’s ManualRelated DocumentsThe Intermec web site at www.intermec.com contains our documents (in PDF) that you can download for free.To order printed versions of the Intermec manuals, contact your local Intermec representative or distributor.Other Copyright Information Microsoft, Windows, and the Windows logo are registered trademarks of Microsoft Corporation in the United States and/or other countries.Bluetooth is a trademark of Bluetooth SIG, Inc., U.S.A.Wi-Fi is a registered certification mark of the Wi-Fi Alliance.This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)This product includes cryptographic software written by Eric Young. (eay@cryptsoft.com)This product uses Regex++, Index software during its operational phases. The owner of Regex++ has granted use of the software to anyone provided such use is accompanied by the following copyright and permission notice:Regex++, Index. (Version 3.31, 16th Dec. 2001)Copyright ©1998-2001 Dr. John MaddockPermission to use, copy, modify, distribute and sell this software and its documentation for any purpose is hereby granted without fee, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. Dr. John Maddock makes no representations about the suitability of this software for any purpose. It is provided “as is” without express or implied warranty.
 CK32 I-Safe Handheld Computer User’s Manual xiPatent Information This product is covered by one or more of the following US Patents and corresponding international patents worldwide:4894523, 4953113, 4961043, 4970379, 4988852, 5019699, 5021642, 5038024, 5081343, 5095197, 5144119, 5144121, 5182441, 5187355, 5187356, 5195183, 5216233, 5216550, 5195183, 5195183, 5218191, 5227614, 5233172, 5241488, 5243602, 5258606, 5278487, 5288985, 5308966, 5322991, 5331136, 5331580, 5342210, 5349678, 5359185, 5371858, 5373478, 5389770, 5397885, 5410141, 5414251, 5416463, 5442167, 5464972, 5468947, 5468950, 5477044, 5486689, 5488575, 5500516, 5502297, 5504367, 5508599, 5514858, 5530619, 5534684, 5536924, 5539191, 5541419, 5548108, 5550362, 5550364, 5565669, 5567925, 5568645, 5572007, 5576529, 5592512, 5594230, 5598007, 5608578, 5616909, 5619027, 5627360, 5640001, 5657317, 5659431, 5671436, 5672860, 5684290, 5719678, 5729003, 5742041, 5761219, 5764798, 5777308, 5777309, 5777310, 5786583, 5793604, 5798509, 5798513, 5804805, 5805807, 5811776, 5811777, 5818027, 5821523, 5828052, 5831819, 5834753, 5834749, 5837987, 5841121, 5842070, 5844222, 5854478, 5862267, 5869840, 5873070, 5877486, 5878395, 5883492, 5883493, 5886338, 5889386, 5892971, 5895906, 5898162, 5902987, 5902988, 5912452, 5923022, 5936224, 5949056, 5969321, 5969326, 5969328, 5979768, 5986435, 5987192, 5987499, 5992750, 6003775, 6012640, 6016960, 6018597, 6024289, 6034379, 6859190, 6064763, 6075340, 6095422, 6097839, 6102289, 6102295, 6109528, 6119941, 6128414, 6138915, 6149061, 6149063, 6152370, 6155490, 6158661, 6164542, 6164545, 6173893, 6195053, 6234393, 6234395, 6244512, 6249008, 6328214, 6330975, 6345765, 6356949, 6367699, 6375075, 6375076, 6375344, 6431451, 6435411, 6484944, 6488209, 6497368, 6532152, 6538413, 6539422, 6621942, 6641046, 6681994, 6687403, 6688523, 6732930, 6036093, 6039252, 6889903, 6967280, 7027037, 7035466, 7090137, 7121467There may be other U.S. and foreign patents pending.
xii CK32 I-Safe Handheld Computer User’s Manual
CK32 I-Safe Handheld Computer User’s Manual 11Using the CK32 I-Safe Handheld ComputerUse this chapter to familiarize yourself with the CK32 I-Safe Handheld Computer. In this chapter you will find these sections:• Introducing the CK32 I-Safe Handheld Computer• Using the Battery•Using the Keypad• Understanding the Status Lights•Using the Touch Screen•About the Audio System• Understanding the Audio Feedback• Scanning Bar Codes
Chapter 1 — Using the CK32 I-Safe Handheld Computer2 CK32 I-Safe Handheld Computer User’s ManualIntroducing the CK32 I-Safe Handheld ComputerThe Intermec CK32 I-Safe is an ergonomically designed handheld computer built on the Microsoft® Windows® Mobile operating system. It is a easy-to-use, reliable computer that runs client/server and browser-based applications and is certified to be intrinsically safe.The CK32 I-Safe is designed to support world-wide intrinsic safety standards and comply with relevant European Directives. Testing and certification requires meeting the standards of Underwriters Laboratories, ATEX directives in Europe and IEC standards in the rest of the world.CK32 I-Safe Handheld ComputerScanbuttonBatteryCommunicationsportPowerScanner windowBacklightCK32 I-Safe Handheld Computers with an IEEE 802.11b/g radio installed are Wi-Fi® certified for interoperability with other 802.11b/g wireless LAN devices.
Chapter 1 — Using the CK32 I-Safe Handheld ComputerCK32 I-Safe Handheld Computer User’s Manual 3The CK32 I-Safe includes these features:• PXA270 Intel Processor• Windows Mobile 5.0 Operating System• Voice over IP support. User responsible for software integration.• Bluetooth support for scanner, RFID, Voice• 128 MB DRAM, 64 MB Flash• 512 MB embedded SD Mass Storage Card• Intrinsic safety certification for North America, Europe and countries accepting IECEx Scheme • European directive complianceThese options are available for the CK32 I-Safe:• TE 2000 terminal emulation application including 3270, 5250, and VT/ANSI as well as support for third-party TE applications• Data Collection Browser (dcBrowser™) applicationUse this manual to understand how to use the features and options available on the CK32 I-Safe. For additional help using terminal emulation, see the TE 2000 Terminal Emulation Programmer’s Guide (P/N 977-055-xxx).For additional help using dcBrowser, see the documentation that ships with the dcBrowser gateway software or the Data Collection Browser Client User’s Guide (P/N 070-011-xxx).iBrowse is a locked-down web browser for Intermec devices that is compatible with Microsoft’s Internet Explorer but does not allow the user to exit the browser or access non-work related web sites. For additional help using iBrowse, see the iBrowse User’s Guide (P/N 961-055-xxx).For a complete list of accessories, see  “Accessories” on page 122.
Chapter 1 — Using the CK32 I-Safe Handheld Computer4 CK32 I-Safe Handheld Computer User’s ManualUsing the BatteryThe CK32 I-Safe uses a model AB6 (P/N 318-021-xxx) lithium-ion battery as its main power source. You must fully charge the main battery before you can use the CK32 I-Safe. When you change the battery, a backup battery maintains your status, memory, and real-time clock for at least 10 minutes. You must suspend your CK32 I-Safe before removing the battery, or data loss may occur..When the battery reaches the end of its useful life, the spent battery should be disposed of by a qualified recycler or hazardous materials handler. Do not mix this battery with the solid waste stream. Contact your Intermec Technologies Service Center for recycling or disposal information.If the battery is at a critical level, you may not be able to boot the device. You must replace the battery with a fully charged batteryThe lithium-ion battery pack that is used in this device may present a fire or chemical burn hazard if it is mistreated. Do not disassemble it, heat it above 100°C (212°F) or incinerate it.Note: In the U.S.A., the EPA does not consider spent lithium-ion batteries as hazardous waste.Li-ionLi-ion
Chapter 1 — Using the CK32 I-Safe Handheld ComputerCK32 I-Safe Handheld Computer User’s Manual 5Charging and Installing the BatteryMake sure you fully charge the AB6 battery before using your CK32 I-Safe. To charge the battery• Insert the battery into the AC11 4-slot battery charger. Charging time is approximately 7 hours.To install the battery• Insert the tabs on the bottom of the charged battery into the CK32 I-Safe and snap the battery into place.Inserting the AB6 BatteryYou must suspend your CK32 I-Safe before removing the battery, or data loss may occur.Battery latchBeeperAB6 batterySpeaker(internal)Explosion Hazard – Use Intermec battery pack Model AB6 only. It is rated as Intrinsically Safe but it MUST NOT BE CHANGED while in a Class II or Class III environment. The battery can be changed in a Class 1 (gas) environment.
Chapter 1 — Using the CK32 I-Safe Handheld Computer6 CK32 I-Safe Handheld Computer User’s ManualMaximizing Battery LifeThere are several things that you can do to extend the life of your fully charged battery.• Verify that Radio Power Management is enabled (Fast PSP). Enabling radio power management allows your radio to switch between awake and sleep modes based on network traffic. If you use the default setting of disabled (CAM), you will have the best network performance (data throughput) but it will draw the most power from your battery.• Verify that the backlight timeout is set to 15 seconds.• Verify that each setting under Power Management (Device timeout, Screen timeout) has a value of 1 minute.You can use Intermec Settings to easily make all of these configuration changes.Checking the Battery StatusYou can check the battery status by looking at the Battery icon on the front of the CK32 I-Safe or by checking the Power Settings. Tap the Battery icon on the Status bar or use the following procedure to check the Power Settings on your CK32 I-Safe. Either method will take you to the Settings display which indicates the percent of battery charge remaining.To check the Power Settings1Tap  Start. The Start menu appears. 2Tap  Settings > System. 3Tap the Power icon. The Power Settings display appears.
Chapter 1 — Using the CK32 I-Safe Handheld ComputerCK32 I-Safe Handheld Computer User’s Manual 7Understanding the Low Battery WarningsWhen the battery charge is getting low, you will receive an audible alert and an initial pop-up warning message with a blue border. The warning message indicates “Main Battery Low. To prevent possible data loss, replace or recharge your battery according to the owner’s manual.” A second battery icon with an ! inside also appears on the Status bar.If the first warning is not dismissed, it is followed by another audible alert and a second pop-up warning message with a red border. This message indicates “Main Battery Very Low. To prevent possible data loss, replace or recharge your battery according to the owner’s manual.”If the battery charge continues to drop, the red battery status LED blinks and the CK32 I-Safe enters Suspend mode. If the battery charge continues to drop, the battery status LED will stop blinkingYou can change the audible alert using the Sounds & Notifications applet. To change the audible alert•Tap Settings > Personal > Sounds & Notifications.
Chapter 1 — Using the CK32 I-Safe Handheld Computer8 CK32 I-Safe Handheld Computer User’s ManualUsing the KeypadYour CK32 I-Safe has one of the following keypad overlay options:• 42-key large numeric and function• 56-key full alphanumericYou enter all of the characters and functions printed above the keys just like you would on a standard keypad.The CK32 I-Safe supports TE 2000 VT100/220/320/340 and ANSI, TE 2000 5250, and TE 2000 3270. Use the TE 2000 keypad overlays to enter the same keys that you can enter on a VT/ANSI keyboard, and IBM 5250 keyboard, or an IBM 3270 keyboard. Like the standard CK32 I-Safe overlay, the TE 2000 keypad overlays let you enter all the characters printed on or above the keys. The terminal emulation keypads also come with the same color-coded keys that are on the standard overlay.For help using TE 2000 terminal emulation, see the TE 2000 Terminal Emulation Programmer’s Guide (P/N 977-055-xxx).Note: You must use the color-coded keys to access several hidden characters (such as { and }) on the CK32 I-Safe keypad.
Chapter 1 — Using the CK32 I-Safe Handheld ComputerCK32 I-Safe Handheld Computer User’s Manual 942-Key Large Numeric and Function Keypad: This keypad is designed for applications that enter mainly numeric data (0-9) and that need dedicated function keys (F1- F12). This keypad also lets you enter the entire alphabet and special characters by pressing color-coded key sequences.HomePageNewLnHelpDelSp\3270/5250InsCapsABCDPrint E FGFld HIEOFJReset.KPA1LPA2 MN AutLgOAttn P Clear QDup R ClrSFldExit THex UFMark V SysRqWRollXRollYZ/PA3Fld-+7896543210F1Shift EscF2 F3F5 F6 F7F9 F10 F11F4F8F12Ctl AltAlphaSp
Chapter 1 — Using the CK32 I-Safe Handheld Computer10 CK32 I-Safe Handheld Computer User’s Manual56-Key Full Alphanumeric Keypad: This keypad is designed for applications that enter mainly numeric data (0-9) and that may need to enter the entire alphabet. The keypad also provides function keys (F1-F24) and special characters, symbols, and functions by pressing color-coded key sequences.Using the Color-Coded KeysThe keypad of the CK32 I-Safe provides color-coded keys to let you access additional characters, symbols, and functions printed on the keypad overlay. Once you understand how to use the color-coded keys and key sequences, you will know how to access all of the additional features printed on the keypad overlay. There are two color-coded modifier keys on the CK32 I-Safe: the orange B key and the green C key.3270/5250F10FldExit HexF6PA2PrintFldEOFHelpF5PA1_^HomeHomeNewLnFldExit(&*InsF8F7AutLgPA3Caps Attn ClrClear DupEraseShiftSpDelResetFld)CtlF11 F12 F13 F14F9’/\+=F15 F16 F17FMarkF18 F19F20 F21 F22SReqF23 F24<>Roll Roll#-+Pg PgPgPgAAltF2F1EscF4F3CDEFGHIJKLMNOPQRWXYZSTUVB741520.6389
Chapter 1 — Using the CK32 I-Safe Handheld ComputerCK32 I-Safe Handheld Computer User’s Manual 11You press and release the first key and then press and release the second key to access the color-coded character or function printed above a key.Capitalizing All CharactersTo type all alphabetic characters as uppercase letters, you can enable the Caps Lock feature on the CK32 I-Safe keypad.To enable Caps Lock1Press the orange B key. The B icon appears on the status bar.2To enable Caps Lock and make the Caps Lock icon (   ) appear on the status bar, press a second key:• On the 42-key keypad, press Shift.• On the 56-key keypad, press A.3Type an alphanumeric character. The letter appears as an uppercase character on the screen.To disable Caps Lock•Press the orange B key and then press either Shift or A (depending on your keypad). The Caps Lock icon disappears from the status bar.Using the Power ButtonWhen you press the Power button to turn off the CK32 I-Safe, you actually put the computer in Suspend mode. In Suspend mode, the CK32 I-Safe continues to supply power to all memory, but turns off power to most hardware. Network connectivity for 802.11 is not maintained in Suspend mode but are restored upon resume. This power-saving feature is designed to prolong battery life.When you press the Power button to turn the CK32 I-Safe back on, your computer resumes where it was when you turned it off. If you are using WPA or 802.1x security, the computer may need to reauthenticate before it starts your application.
Chapter 1 — Using the CK32 I-Safe Handheld Computer12 CK32 I-Safe Handheld Computer User’s ManualIf the Battery light flashes and your CK32 I-Safe does not resume after pressing the Power button, your battery may be too low to supply power. Replace the battery. If replacing the battery does not solve the problem, see “Resetting Your Computer” on page 110.You can also use the Power button to reset the CK32 I-Safe. See “Resetting Your Computer:” on page 110 for more information.Understanding the Status LightsThe status lights on the CK32 I-Safe turn on to indicate the status of the keyboard, battery, or a successful decode of a bar code.CK32 I-Safe Status LightsNote: Microsoft Windows Mobile supports other power saving modes including Screen Off, Unattend, and Suspend. Refer to Windows Mobile documentation for additional information.Batterylight (red)Keyboardstatus lightsGood readlight (green)Ready to-Workindicator (blue)
Chapter 1 — Using the CK32 I-Safe Handheld ComputerCK32 I-Safe Handheld Computer User’s Manual 13Understanding the CK32 I-Safe Status LightsLight Name DescriptionKeyboard Status lights The left keyboard status light indicates the Shift Lock (orange) key is selected. The right keyboard status light indicates the Alpha Lock (green) key is selected.Battery Light Status What It MeansOff The battery is charged.Blinking Red The battery blinks when the charge is low. Continued use causes the CK32 I-Safe to enter Suspend mode. You may also experience a blinking low battery light when the battery is low and you attempt to take the CK32 I-Safe out of Suspend mode. This is normal and indicates the battery needs to be charged before you use the computer.Good Read  This green light indicates when the CK32 I-Safe successfully decodes a bar code.Ready-to-Work™ indicator This blue light indicates when the CK32 I-Safe is ready to use in your application, typically TE 2000. If you have problems using TE 2000, see the TE 2000 Terminal Emulation Programmer’s Guide (P/N 977-055-xxx).Light Status What It MeansOff The TE 2000 application has not loaded successfully, or you are not running a Ready-to-Work application.Blinking The CK32 I-Safe is not connected to the host.On A connection to the server has been established and all network connections are active.
Chapter 1 — Using the CK32 I-Safe Handheld Computer14 CK32 I-Safe Handheld Computer User’s ManualUsing the Touch ScreenThe CK32 I-Safe has a color touch screen display. The screen is 240 x 320 pixels. The desktop is 240 x 300 pixels and the taskbar is 240 x 20 pixels. In addition, the screen supports Unicode characters, user-programmable fonts, and bitmap graphics.CK32 I-Safe Start ScreenThe Start screen has two distinct areas: the desktop and the taskbar.The desktop displays shortcuts to some of the applications installed on the CK32 I-Safe. The taskbar displays the Start menu icon, the time, the keyboard icon, and the desktop icon.
Chapter 1 — Using the CK32 I-Safe Handheld ComputerCK32 I-Safe Handheld Computer User’s Manual 15Using the StylusYour CK32 I-Safe has a stylus for selecting items and entering information on the touch screen. Use the stylus in place of a mouse.Using the StylusAligning the ScreenIf the screen does not respond correctly when you tap it with the stylus, you may need to align the screen.To align the screen1Tap the Start icon. The Start menu appears.Action DescriptionTouch Touch the screen once with the stylus to select options, launch applications, close applications, or launch menus from the taskbar.Double-tap Double-tap the screen with the stylus to launch applications.Drag Hold the stylus on the screen and drag across the screen to select text and images.Tap and hold Tap and hold the stylus on an item to see a list of actions available for that item. Tap the action you want to perform.
Chapter 1 — Using the CK32 I-Safe Handheld Computer16 CK32 I-Safe Handheld Computer User’s Manual2Tap  Settings > System. 3Tap the Screen icon to open the Screen applet and then tap the Align Screen button. About the Audio SystemThe CK32 I-Safe provides audio paths to support the following third-party applications:•Interactive VoIP• Walkie-Talkie• Digital recording•AV playbackUnderstanding the Audio FeedbackThe CK32 I-Safe provide you with audio feedback when it performs some functions. For example, you may hear a beep each time you scan a valid bar code. You can change the beeper volume for your needs and environment. To enable and adjust the beeper volume1Tap  Start > Settings > the Personal tab > the Sounds & Notifications tab > Sounds tab.2Tap the sounds that you want to enable, then tap ok to close the Sounds tab.
Chapter 1 — Using the CK32 I-Safe Handheld ComputerCK32 I-Safe Handheld Computer User’s Manual 173Tap the Volume icon at the top of the screen, tap On, and then move the slider bar to the desired volume level.To disable the beeper volume• To disable the beeper, tap the Volume icon, then drag the slider to the bottom of the scale, or tap Off.
Chapter 1 — Using the CK32 I-Safe Handheld Computer18 CK32 I-Safe Handheld Computer User’s ManualYou can also change the beeper volume using the Intermec Setting application or by using the Beeper Volume command as described below.Additional Ways of Changing the Beeper VolumeScanning Bar CodesUse the scanner to scan and enter bar code data. The CK32 I-Safe supports the scanning of 1D linear bar codes. When you unpack the CK32 I-Safe, these bar code symbologies are enabled:•Code 39•Code 128•PDF417•UPC-A•UPC-E•EAN-8• EAN-13If you are using bar code labels that are encoded in a different symbology, you need to enable the symbology on the CK32 I-Safe. Use Intermec Settings to enable and disable symbologies for your scanner. Method ProcedureUse the Intermec Settings application.Go to Start > Settings > System > Intermec Settings > Device Settings > Beeper > Volume. Remember to press Save when using Intermec Settings.Use the Beeper Volume command.For help, see “Beeper Volume” in the Intermec Computer Command Reference Manual.Do not look directly into the window area or at a reflection of the beam while the CK32 I-Safe is scanning. Long-term exposure to the beam can damage your vision.
Chapter 1 — Using the CK32 I-Safe Handheld ComputerCK32 I-Safe Handheld Computer User’s Manual 19Enabling or Disabling SymbologiesUse the following procedure to enable or disable symbologies on your CK32 I-Safe.To enable or disable symbologies1Tap  Start. The Start menu appears. 2Tap  Settings > System. 3Tap the Intermec Settings icon. The Intermec Settings application appears.4From the Intermec Settings application, go to Data Collection > Internal Scanner > Symbologies.5Enable or disable any of the supported symbologies.6Tap  File > Save Setting to save your settings.7Tap  File > Exit to close Intermec Settings. 8Scan bar code labels.Scanning a Bar Code Label to Verify Scanner OperationUse the following procedure to practice how to scan a bar code and to verify that your scanner is working correctly.
Chapter 1 — Using the CK32 I-Safe Handheld Computer20 CK32 I-Safe Handheld Computer User’s ManualTo scan most bar code labels and verify scanner operation1Press the Power button to turn on the CK32 I-Safe.2Tap  Start on the navigation bar located at the top of the screen. 3Tap  Word Mobile > New to open the Word Mobile application and a blank document.4Point the scanner window at the bar code label and hold the computer at a slight angle 15 to 25 cm (6 to 10 in) from the label.5Press the Scan button on the keypad, or pull the trigger on a handle, and direct the red beam so that it falls across all bars in the bar code label. The information you scanned appears in the Word Mobile document.Code 39 Test Bar Code*123456**123456*When the CK32 I-Safe successfully reads a bar code label, you hear a high beep and the green Good Read light turns on briefly.*INTERMEC**INTERMEC*
Chapter 1 — Using the CK32 I-Safe Handheld ComputerCK32 I-Safe Handheld Computer User’s Manual 216Release the Scan button.To scan a PDF417 or Micro PDF417 bar code and verify scanner operation1Press the Power button to turn on the CK32 I-Safe. 2Point the scanner window PDF417 or Micro PDF417 bar code label and hold the computer at a slight angle 15 to 25 cm (6 to 10 in) from the label.3Press the Scan button on the keypad or pull the trigger on a handle, and direct the red beam so that it falls across at the top row of the bar code label.Scanning a PDF417 or Micro PDF417 Bar Code Label Use this test bar code:PDF417 Test Bar Code*123456789abcdefg*4Move the beam down all rows of the bar code label. The CK32 clicks as it reads each row.5The CK32 I-Safe emits a high beep and the green Good Read light turns on briefly when the CK32 I-Safe successfully reads the entire bar code label.
Chapter 1 — Using the CK32 I-Safe Handheld Computer22 CK32 I-Safe Handheld Computer User’s ManualYou may need to continue moving the beam from the bottom of the bar code label to the top, and back to the bottom, until you hear the high beep.6Release the Scan button.
CK32 I-Safe Handheld Computer User’s Manual 232Understanding Windows MobileThis chapter introduces Microsoft Windows Mobile 5.0 for Pocket PC. In this chapter you will find these sections:• Understanding Windows Mobile• Using Microsoft ActiveSync• Using Internet Explorer Mobile
Chapter 2 — Understanding Windows Mobile24 CK32 I-Safe Handheld Computer User’s ManualUnderstanding Windows MobileThis chapter introduces Microsoft Windows Mobile 5.0. While using your CK32 I-Safe, keep these key points in mind:•Tap Start on the navigation bar, located at the top of the screen, to quickly move to programs, files, and settings. Use the command bar at the bottom of the screen to perform tasks in programs. The command bar includes menus, icons, and the onscreen keyboard.• Tap and hold an item to see a pop-up menu containing a list of actions you can perform. Pop-up menus give you quick and easy access to the most common actions.Tap Start > Help, then select a topic on your CK32 I-Safe to find additional information on Windows Mobile components.Microsoft Windows Mobile contains these standard companion programs:•Word Mobile•Excel Mobile•PowerPoint MobileFinding Information in Windows MobileThis chapter describes your CK32 I-Safe hardware, provides an overview of the programs on your CK32 I-Safe, and explains how to connect your CK32 I-Safe to a desktop, a network, or the Internet. Use the following table to understand more about the CK32 I-Safe. Finding Information in Windows MobileFor Information on: See this Source:Programs on the CK32 I-Safe. This chapter and the CK32 I-Safe Help. To view Help, tap Start > Help and then select a topic.Additional programs you can install on the CK32 I-Safe.The Windows Mobile CD.
Chapter 2 — Understanding Windows MobileCK32 I-Safe Handheld Computer User’s Manual 25Windows Mobile and many of the technologies supported by the CK32 I-Safe are not from Intermec Technologies. Many of the utilities and features on a Windows Mobile device come directly from Microsoft without any modification from Intermec Technologies. There may be certain Microsoft-specific issues that Intermec Technologies would not be able to support, so contact our front-line support personnel to determine the best source of assistance.Use these URLs for additional information about Microsoft Windows Mobile (Pocket PC):•msdn.microsoft.com/support/•support.microsoft.com/•news.microsoft.comLearning the Basic SkillsLearning to use the CK32 I-Safe is easy. This section describes the basic concepts of using and customizing your CK32 I-Safe Computer.Using the Today ScreenWhen you turn on your CK32 I-Safe for the first time each day, you see the Today screen. You can also display it by tapping the Start icon at the top left of your display and then To d a y. On the Today screen, you can see important information for the day.To customize what displays on the Today screen•Tap Start > Settings > the Personal tab > To d a y.Status icons display information such as when the CK32 I-Safe is connected to the network or to the Internet. You can tap an icon to open the associated setting or program.Connecting to and synchronizing with a PC.The ActiveSync Help on your desktop. To view Help, click Help > Microsoft ActiveSync Help.Last minute updates and detailed technical information.The readme files located in the Microsoft ActiveSync folder on the desktop and on the Windows Mobile CD.Up-to-date information on Windows Mobile.www.microsoft.com/windowsmobile/Finding Information in Windows Mobile (continued)For Information on: See this Source:
Chapter 2 — Understanding Windows Mobile26 CK32 I-Safe Handheld Computer User’s ManualAccessing ProgramsYou can switch from one program to another by selecting it from the Start menu. To access programs•Tap Start > Programs and then the program name.The following is a partial list of programs that are on your CK32 I-Safe, in the order they appear in the Start menu. Look on the Windows Mobile CD for additional programs that you can install onto your CK32 I-Safe.•Calendar•Contacts• Internet Explorer• Messaging• Windows MediaClosing an ApplicationTapping the OK at the upper right of the application display does not mean that the application is closed. To make sure that an application is properly closed you need to verify that the memory used by the application is released. To release memory•Tap Start > Settings > System > Memory > Running Programs. Select the application you want to close and tap Stop.Using the Navigation Bar and the Command BarThe navigation bar is located at the top of the screen. It displays the active program and current time, and allows you to switch to programs and close screens.Windows Mobile Navigation BarThe command bar is located at the bottom of the screen. Use the command bar to perform tasks in programs. The command bar includes menu names, functions, and the Input Panel icon when needed.
Chapter 2 — Understanding Windows MobileCK32 I-Safe Handheld Computer User’s Manual 27Windows Mobile Command BarUsing Pop-Up MenusUse pop-up menus to quickly perform an action on an item. For example, you can use a pop-up menu to delete or make a copy of an item. To access a pop-up menu, tap and hold the item on which you want to perform the action. When the menu appears, tap the action you want to perform, or tap anywhere outside the menu to close the menu without performing the action.Entering InformationYou can enter information on your CK32 I-Safe in several ways depending on the program you are using:Use the input panel to enter information in any program on your CK32 I-Safe Computer. You can either type using the onscreen keyboard or write using Block Recognizer, Letter Recognizer, or Transcriber. In either case, the characters appear as typed text on the screen.To show or hide the input panel1Tap the Input Panel icon. Understanding the Ways to Enter InformationEnter Information By: DescriptionSynchronizing Use Microsoft ActiveSync to synchronize or copy information between your desktop PC and the CK32 I-Safe. For more information on ActiveSync, see ActiveSync Help on your desktop PC. Intermec recommends using ActiveSync version 4.1 or later with Windows Mobile devices. You can download the latest version of ActiveSync on the Microsoft web site.Typing Enter typed text into the CK32 I-Safe by tapping keys on the onscreen keyboard or by using the handwriting recognition software.Writing Use the stylus to write directly on the screen.Drawing Use the stylus to draw directly on the screen.Recording Create a stand-alone recording or embed a recording into a document or note.
Chapter 2 — Understanding Windows Mobile28 CK32 I-Safe Handheld Computer User’s Manual2Tap the arrow next to the Input Panel icon to see your choices.When you use the input panel, your CK32 I-Safe Computer anticipates the word you are typing or writing and displays it above the input panel. When you tap the displayed word, it is inserted into your text at the insertion point. The more you use the CK32 I-Safe, the more it learns to anticipate.To change word suggestion options, such as the number of words suggested at one time, tap Start > Settings > the Personal tab > Input > the Word Completion tab.Typing With the Onscreen KeyboardTap the input panel arrow, then tap Keyboard. On the soft keyboard that is displayed, tap the keys with your stylus.• To type lowercase letters, tap the keys with the stylus.• To type a single uppercase letter or symbol, tap the Shift key. To tap multiple uppercase letters or symbols, tap the CAP key.• To convert a letter to uppercase, tap and hold the stylus on the letter and drag up.• To add a space, drag the stylus to the right across at least two keys.• To backspace one character, drag the stylus to the left across at least two keys.• To insert a carriage return, tap and hold the stylus anywhere on the keyboard and drag down.
Chapter 2 — Understanding Windows MobileCK32 I-Safe Handheld Computer User’s Manual 29To use larger keys1Tap the input panel arrow.2Select Options.3Select the Large keys radio button.Using Block RecognizerCharacter recognition software gives you a fast and easy method for entering information in any program on the CK32 I-Safe. Letters, numbers, and punctuation you write are translated into typed text.To use Block Recognizer1Tap the input panel arrow and then tap Block Recognizer.2Write a letter in the box. It converts to typed text that appears on the screen.For help using Block Recognizer, tap the question mark next to the writing area.Using Letter RecognizerWith Letter Recognizer, you can write letters using the stylus just as you would on paper.To use Letter Recognizer1Tap the input panel arrow and then tap Letter Recognizer.2Write a letter in the box. It converts to typed text that appears on the screen.For help using Letter Recognizer, tap the question mark next to the writing area.Using TranscriberWith Transcriber, you can write anywhere on the screen using the stylus block just as you would on paper. Unlike Letter Recognizer and Clock Recognizer, you can write an entire sentence of information.To use Transcriber1Tap the input panel arrow and then tap Tr a nscr iber.2Tap  ok.
Chapter 2 — Understanding Windows Mobile30 CK32 I-Safe Handheld Computer User’s Manual3Write anywhere on the screen. Pause and let Transcriber change the written characters to typed characters.For help using Transcriber, tap the question mark in the lower right-hand corner of the screen.Selecting Typed TextIf you want to edit or format typed text, you must select it first. Drag the stylus across the text you want to select. You can cut, copy, and paste text by tapping and holding the selected words and then tapping an editing command on the pop-up menu or by tapping the command under Menu.Writing on the ScreenIn any program that accepts writing, such as the Notes program, you can use your stylus to write directly on the screen. Write the way you do on paper. You can edit and format what you have written and convert the information to text in the future.To convert the writing to text•Select Menu > To o l s  > Recognize. Your writing is converted to text.Finding and Organizing InformationYou can use File Explorer to find files on your CK32 I-Safe and organize these files into folders. To open File Explorer•Select Start > Programs > File Explorer.Customizing the CK32 I-SafeYou can customize the CK32 I-Safe by adjusting settings and installing additional software.Adjusting SettingsYou can adjust CK32 I-Safe settings for your environment. To view the Settings options•Select Start > Settings > either the Personal tab, the System tab, or the Connections tab.
Chapter 2 — Understanding Windows MobileCK32 I-Safe Handheld Computer User’s Manual 31Example of the Personal TabAdjustable Settings on the CK32 I-Safe Setting Why Adjust It?Buttons To associate a program with a button or customize the way your Up/Down control repeats.Input To select and customize the input method you want to use (Keyboard, Block Recognizer, Letter Recognizer, or Transcriber).Lock To limit access to the CK32 I-Safe.Menus To customize what appears on the Start menu. Only 7 programs can appear on the Start menu.Owner InformationTo enter your contact information.Sounds & NotificationsTo Enable or Disable sounds for events, programs, or notifications. Today To select items to appear on the Today screen.You can also change the appearance of your desktop.
Chapter 2 — Understanding Windows Mobile32 CK32 I-Safe Handheld Computer User’s ManualAdding or Removing ProgramsPrograms added to your CK32 I-Safe at the factory are stored in Read Only Memory (ROM). You cannot remove this software. All other programs and files added to the CK32 I-Safe after factory installation are stored in Random Access Memory (RAM).You can install any program created for the CK32 I-Safe, as long as the computer has enough memory available. Go to the Windows Mobile web site (www.microsoft.com/windowsmobile/resources/communities/default.mspx) to find software.Using Microsoft ActiveSyncUse Microsoft ActiveSync to synchronize the information on your desktop with the information on the CK32 I-Safe. Synchronization compares the data on the CK32 I-Safe with your PC and updates both computers with the most recent information.You can also perform these functions with ActiveSync:• Copy files between the CK32 I-Safe and the desktop.• Back up and restore the CK32 I-Safe data.• Control when synchronization occurs by selecting a synchronization mode.• Select which information types are synchronized and control how much data is synchronized.To install ActiveSync1Connect the CK32 I-Safe to your desktop PC using the AN1 Communications Adapter (P/N 872-223-xxx).2Install ActiveSync on your desktop. ActiveSync is available from the Windows Mobile CD or from the Microsoft web site. ActiveSync is already installed on the CK32 I-Safe.Note: By default, ActiveSync does not automatically synchronize all types of information. Use ActiveSync options to turn synchronization on or off for specific information types.Note: Intermec recommends using ActiveSync version 4.1 or later with Windows Mobile devices. You can download the latest version of ActiveSync on the Microsoft web site.
Chapter 2 — Understanding Windows MobileCK32 I-Safe Handheld Computer User’s Manual 33After installation, ActiveSync automatically launches the ActiveSync Setup Wizard.3Follow the screens of the ActiveSync to complete the synchronization process. The wizard helps you connect to the CK32 I-Safe, set up a partnership for synchronization, and customizes synchronization settings.The synchronization process automatically begins when you finish the wizard.4Disconnect the CK32 I-Safe from your desktop PC.Once you have set up ActiveSync and completed the first synchronization process, you can initiate synchronization from your CK32 I-Safe.To start ActiveSync on your CK32 I-Safe•Tap Start > Programs > ActiveSync. ActiveSync opens and shows you the synchronization status.For more information about ActiveSync on the CK32 I-Safe, switch to ActiveSync, tap Start > Help, and then select a topic.
Chapter 2 — Understanding Windows Mobile34 CK32 I-Safe Handheld Computer User’s ManualUsing Internet Explorer MobileYou can use Internet Explorer Mobile to run web-based applications, and view pages downloaded to the CK32 I-Safe. You can also connect to the internet through an ISP or a network connection.You can make connections using a modem, a wireless network, or Ethernet. You can use a modem connection to set up connections with an external modem.To use Internet Explorer1Set up a connection to your ISP or corporate network by going to Start > Settings > Connections > and tap the Connections icon. Use the Connections Help to understand the process you need to go through to set up a connection.2Tap  Start > Internet Explorer. The default page that appears when you open Internet Explorer contains links to Intermec-specific information and to the Windows Mobile web site.Default Internet Explorer Web Page
CK32 I-Safe Handheld Computer User’s Manual 353Configuring the CK32 I-SafeUse this chapter to understand how to configure the CK32 I-Safe to communicate in your network. In this chapter, you will find these sections:• Configuring the CK32 I-Safe Operating Parameters• Setting Up Ethernet Communications• Setting Up Bluetooth Communications• Setting Up 802.11 Radio Communications• Configuring Security on the CK32 I-Safe
Chapter 3 — Configuring the CK32 I-Safe36 CK32 I-Safe Handheld Computer User’s ManualConfiguring the Operating ParametersYou can configure many operating parameters on the CK32 I-Safe, such as the symbologies it decodes or the network settings it uses. The CK32 I-Safe provides a configuration application called Intermec Settings that allows you to set all of the operating parameters in one place.Configuring the CK32 I-Safe Using Intermec SettingsUse Intermec Settings to configure the CK32 I-Safe and to view system information. You access Intermec Settings from the Settings menu.To start Intermec Settings1Tap the Start icon to open the Start menu.2From the Start menu, select Settings.3From the Settings window, select the System tab.4Tap the Intermec Settings icon (  ). The Intermec Settings application appears.Note: Using Intermec Settings, there is no way of detecting preferred networks.
Chapter 3 — Configuring the CK32 I-SafeCK32 I-Safe Handheld Computer User’s Manual 37For detailed information on the commands available in Intermec Settings, see the Intermec Computer Command Reference Manual (P/N 073529). The Intermec Computer Command Reference Manual is available from the Intermec web site.Remotely Configuring the CK32 I-Safe Using SmartSystems FoundationThe SmartSystems™ server lets you manage all your SmartSystems-enabled devices at the same time from a central host PC. The CK32 I-Safe ships with the SmartSystems client, which means it is SmartSystems enabled. The SmartSystems server has a console that displays all of the CK32 I-Safes in your network. In the console, you can right-click a CK32 I-Safe and a menu appears. To configure the CK32 I-Safe, choose Intermec Settings from the menu.The SmartSystems server and console are part of SmartSystems Foundation and are available from the Intermec web site. To download SmartSystems Foundation, go to www.intermec.com/SmartSystems. For information on how to use the SmartSystems server, see the online manual.Setting Up Ethernet CommunicationsYou can use the CK32 I-Safe directly in an Ethernet network by connecting to the network using the AN1 Communications Adapter.Navigating in Intermec SettingsTo Do This Function Do ThisSelect or expand a command Tap the command Select text in a text box Tap in the text box and drag the stylus over the textSave settings Tap File > Save Settings or tap the disk icon.Note: The CK32 I-Safe supports Ethernet communication or 802.11 communications but it cannot support both at the same time. The factory default is no communications are enabled.
Chapter 3 — Configuring the CK32 I-Safe38 CK32 I-Safe Handheld Computer User’s ManualTo use the CK32 I-Safe in an Ethernet network1Tap the iConnect icon ( ) in the lower right corner of the Today screen.From the menu, select Enable > Ethernet. This change disables 802.11 networking on the CK32 I-Safe.2You will be prompted to reboot the device for changes to take affect. Press and hold the Power button for 10 seconds to initiate the reboot. Do not use the Reset button . See “Preferred Reset Method” on page 110 for more information.3Go to Start > Settings > the System tab > Intermec Settings > Communications > Ethernet Adapter > IP Settings.4If you have a DHCP server, enable DHCP.orIf you do not have a DHCP server, set these parameters:• IP address•Subnet mask• Default routerIntrinsically Safe rules prohibit direct connection to the CK32 I-Safe.
Chapter 3 — Configuring the CK32 I-SafeCK32 I-Safe Handheld Computer User’s Manual 395If required for your network, you may also need to set these parameters on each CK32 I-Safe:• Primary and secondary DNS servers• Primary and secondary WINS servers6Make sure your CK32 I-Safe is talking to the network and that the network can see your CK32 I-Safe.To check the status of your Ethernet connection1Tap the iConnect icon ( ) in the lower right corner of the Today screen.2From the menu, select Status > Ethernet. The Ethernet Status screen appears and checks the connection.You can also use iConnect to configure the network settings if you need to change any setting. Tap To o l s  > Ethernet IP Settings from the iConnect menu.Setting Up Bluetooth CommunicationsYou can send information to a Bluetooth device wirelessly using the standard Bluetooth radio in the CK32 I-Safe. The Bluetooth technology uses short-range radio links and allows for communications over a 10-meter (32.8 foot) range.You can use the Bluetooth radio to connect to wireless devices including:• Scanners•Printers• Headsets
Chapter 3 — Configuring the CK32 I-Safe40 CK32 I-Safe Handheld Computer User’s ManualTo turn the Bluetooth radio on1Select Start > Settings > System > Intermec Settings > Bluetooth.2Tap the Power On radio button and tap File > Save Settings.Once Bluetooth is enabled, it stays enabled through a warm or cold boot and maintains virtual COM ports (such as printing) registration. For more information on Bluetooth software, see the Bluetooth Resource Kit and the Wireless Printing Development Guide in the Intermec Developer Library (IDL). You can download this Resource Kit from the Intermec Developer Library web site at www.intermec.com/idl.
Chapter 3 — Configuring the CK32 I-SafeCK32 I-Safe Handheld Computer User’s Manual 41Use this table to understand the settings you see in the Bluetooth menu in Intermec Settings.Configuring Bluetooth Communications for Wireless PrintingThis section explains how to configure the CK32 I-Safe for Bluetooth wireless printing. You need to:• make sure Bluetooth power is on. For help, see the procedure in  “Setting Up Bluetooth Communications” on page 39.• create an application that lets you print. For help, see the next section.• select the current wireless printer on the CK32 I-Safe. For help, see  “Selecting the Current Wireless Printer on the CK32 I-Safe” on page 42.Creating an Application That Lets You Print WirelesslyThe CK32 I-Safe does not ship with an application that lets you print wirelessly. You must create an application that opens the wireless printing COM port on the CK32 I-Safe. For help, see the Bluetooth Resource Kit section of the IDL Resource Kit Developer’s Guide, P/N 934-006-xxx.The Wireless Printing applet is available from Start > Settings > System. The applet separates the task of wireless printing setup from other Bluetooth management tasks.Bluetooth SettingsSetting DescriptionPower Set and view whether the Bluetooth radio is on or off.Class of Device Determines how the device appears to other devices during discovery.Discoverable Makes the CK32 I-Safe discoverable.Connectable Makes the CK32 I-Safe connectable.IBT Displays the version of the Intermec Bluetooth Library.Radio Displays the version of the Bluetooth Radio Hardware.Device Address Displays the Bluetooth address of your CK32 I-Safe.
Chapter 3 — Configuring the CK32 I-Safe42 CK32 I-Safe Handheld Computer User’s ManualThe Wireless Printing applet uses the concept of a “current wireless printer.” The CK32 I-Safe connects to the current wireless printer when your application opens the wireless printing COM port on the CK32 I-Safe. If there is no current wireless printer selected on your CK32 I-Safe, there is no wireless printing COM port registered on your CK32 I-Safe. You must select a current wireless printer on your CK32 I-Safe, as described in the next section.The Wireless Printing applet performs these tasks on the CK32 I-Safe:• Helps you select the current wireless printer• Stores the current wireless printer in the registry• Registers/deregisters the wireless printing COM port• Stores the wireless printing COM port in the registry as the WPortSpecifically, the current wireless printer is registered and deregistered on Bluetooth stack load/unload. If you select a different current wireless printer, the existing wireless printing COM port is deregistered and the new one is registered instead. The Wireless Printing applet uses the Bluetooth COM Port Control to handle COM port registration/deregistration.Selecting the Current Wireless Printer on the CK32 I-SafeBy default, there is no current wireless printer selected on the CK32 I-Safe.There are three ways to select the current wireless printer:• Discovering the printer using Bluetooth device discovery• Manually entering the printer’s Bluetooth device address• Choosing the printer from a list of previously discovered printers
Chapter 3 — Configuring the CK32 I-SafeCK32 I-Safe Handheld Computer User’s Manual 43To discover the printer with Bluetooth device discovery2Tap  Acquire Printer to initiate printer discovery. All Bluetooth printers discovered within range appear in the devices list.3Select the printer you want to connect to and then tap OK.If your preferred printer does not appear, make sure the printer is turned on and discovery is enabled, and then repeat Steps 1 through 3.4Tap  Tes t Pri n t . The printer prints out the test page.1Select Start > Settings > the Systems tab > Wireless Printing. The Wireless Printing wizard appears.
Chapter 3 — Configuring the CK32 I-Safe44 CK32 I-Safe Handheld Computer User’s ManualTo manually enter the device address of the printer3Type the address of the printer in the Enter Device Address text box and then tap OK. The keyword -unknown- appears in the Device Name field in the Current Wireless Printer box. The name of the printer is not sent to the CK32 I-Safe when you manually enter the printer address.4Tap  Tes t Pri n t . The printer prints out the test page.To choose the printer from a list of previously discovered printers1Make sure you have already performed a Bluetooth device discovery.1Select Start > Settings > the System tab > Wireless Printing. The Wireless Printing wizard appears.2Tap  Manual > Acquire Printer. The wizard advances to the next screen where you enter the device address.2Select Start > Settings > the System tab > Wireless Printing. The Wireless Printing wizard appears.3Tap Set Different Printer. The Devices list appears with the list of previously discovered printers.4Select the printer you want and tap OK.5Tap  Tes t Pri n t . The printer prints out the test page.
Chapter 3 — Configuring the CK32 I-SafeCK32 I-Safe Handheld Computer User’s Manual 45Connecting to a Bluetooth Audio DeviceUse the Bluetooth Audio applet to discover, activate, and connect to Bluetooth audio devices such as a Bluetooth headset. You can control the audio volume and microphone gain for the connected Bluetooth audio device.To connect to a Bluetooth headset1Select Start > Settings > the System tab > Bluetooth Audio.2Tap  Search for devices. Discovered audio devices are added to the list with an icon to identify them.3Double-tap a Bluetooth audio device from the list of Connect headsets / hands-free devices.4When a pop-up menu appears and then select Activate. The device icon changes to include a check mark.5Double-tap the device name and then select Connect. When a connection is established, the statues changes to connected.6Tap the Volume slider bar or Microphone slider bar to adjust the setting.Setting Up 802.11 Radio CommunicationsThe CK32 I-Safe has an internal 802.11 b/g radio to transfer data using wireless communications. This section of the manual assumes that you have already set up your wireless communications network including your access points. If you are using a UDP Plus network, you also need to have your Intermec Application Server communicating with a host computer.The CK32 I-Safe supports these network protocols:•TCP/IP• UDP PlusThe next sections explain the parameters you need to configure for the CK32 I-Safe to work in your wireless network.Note: The CK32 I-Safe supports Ethernet communication or 802.11 communications but it cannot support both at the same time. The factory default is no communications are enabled.
Chapter 3 — Configuring the CK32 I-Safe46 CK32 I-Safe Handheld Computer User’s ManualConfiguring the Network Parameters for a TCP/IP NetworkIn a TCP/IP network, the CK32 I-Safe communicates with a host computer directly using TCP/IP. The access point acts as a bridge to allow communications between the wired network and the wireless network.To use wireless communications in a TCP/IP network1Tap the iConnect icon ( ) in the lower right corner of the Today screen.From the menu, select Enable > Wireless. This disables the Ethernet connection.2You will be prompted to reboot the device for changes to take affect. Press and hold the Power button for 10 seconds to initiate the reboot. Do not use the Reset button. See “Preferred Reset method” on page 110 for more information.3Go to Start > Settings > the System tab > Intermec Settings > Communications > 802.11 Radio.4Configure these network parameters on each CK32 I-Safe in the network:• Network name (SSID)• IP settings (if not using DHCP)5Make sure that the CK32 I-Safe is talking to the network and that the network can see the CK32 I-Safe.
Chapter 3 — Configuring the CK32 I-SafeCK32 I-Safe Handheld Computer User’s Manual 476Configure security. For help, see See  “Using ISpyWiFi” on page 48.You can configure the network parameters on the CK32 I-Safe to using Intermec Settings or ISpyWiFi. For information on Intermec Settings, see  “Configuring the CK32 I-Safe Using Intermec Settings” on page 36.Configuring the Network Parameters for a UDP Plus NetworkIn a UDP Plus network, the CK32 I-Safe communicates with a host computer through the Intermec Application Server. The Intermec Application Server translates UDP Plus packets on the wireless network into TCP/IP packets on the wired network and vice versa. The access point acts as a bridge to allow communications between the wired network and the wireless network.To use wireless communications in a UDP Plus network1Go to Start > Settings > the System tab > Intermec Settings > Communications >UDP Plus.2Configure these network parameters on the CK32 I-Safe:• UDP Plus Activate• Controller IP address• Controller Port3Make sure the CK32 I-Safe is talking to the network and that the network can see the CK32 I-Safe.4Configure security. For help, see “Configuring Security on the CK32 I-Safe” in the next section.Checking the Status of Your Wireless ConnectionAfter you configure your wireless settings, you can use iConnect to check the status of your connection.To check the status of your wireless connection1Tap the iConnect icon ( ) in the lower right corner of the Today screen.2From the menu, select Status > Wireless. The Wireless Status screen appears and checks the connection.
Chapter 3 — Configuring the CK32 I-Safe48 CK32 I-Safe Handheld Computer User’s ManualYou can also use iConnect to configure the network settings if you need to change anything by tapping To o l s  > Wireless Settings from the iConnect menu.Using ISpyWiFiThe ISpyWiFi utility provides more detailed information for the 802.11 radio connection in your CK32 I-Safe, such as MAC address, access point information, association, encryption, power management, antenna status, RSSI, data link rates, and supplicant status.Starting the UtilityThe ISpyWiFi utility is installed in your CK32 I-Safe as an executable. You can either start the utility using File Explorer, or creating a shortcut to start the utility from the CK32 I-Safe desktop, or from iConnect.To start the ISpy WiFi utility via File Explorer•Tap Start > Programs > the File Explorer icon, then tap the “\Windows” folder from the root. Scroll down for, then double-click the ISpyWifi executable.To place the ISpyWiFi utility in the Programs group1Press and hold your stylus on the ISpyWifi executable for its pop-up menu, then select Copy.
Chapter 3 — Configuring the CK32 I-SafeCK32 I-Safe Handheld Computer User’s Manual 492Scroll up to the “\Start Menu\Programs” folder, then tap it to open.3Press and hold your stylus in an empty (white) area in the folder, for its pop-up menu, then select Paste Shortcut.Close the File Explorer, select Start > Programs to locate the Shortcut to ISpyWifi icon, like the following. Tap this icon to access the ISpyWifi application. To start iSpyWiFi from iConnect1Tap the iConnect icon ( ) in the lower right corner of the Today screen.2From the menu, select Status > Wireless > Advanced. The iSpyWiFi screen appears.ISpyWiFiThe ISpyWiFi tab con tains netwo rk inter face, configuratio n, access point, and rad io frequen cy informat ion:
Chapter 3 — Configuring the CK32 I-Safe50 CK32 I-Safe Handheld Computer User’s ManualISpyWiFi Tab ContentsWiFi NIC (Network Interface Card)BCMCF1 A WLAN adapter and its associated driver versionMAC The client radio MAC addressIP(DHCP) The IP address of the client radio, if using DHCPIP (Static) The IP address of the client radio, if using a static IP addressAPStatus Shows whether the radio is associated with the access pointChannel The channel on which the radio is communicating with the access pointESSID The text SSID (Network Name) for your networkBSSID MAC address of radio AP with which the client radio is communicatingConfigAssociation Shows one of the following types:Open, WPA, WPA-PSK, WPA2, Network EAPEncrypt Shows potential encryptions for the association shown:Key Absent/WEP, TKIP, Key Absent, TKIP/AES, WEPPower CAM (Constantly Awake Mode) or FAST PSP (Power Save Poll)Antenna Diversity (multiple antennas), Primary (one antenna)RFTX Power Transmit power level in milliwatts (mW).RSSI The Received Signal Strength Indicator. The closer to zero, the better. For example: -40dBm is excellent, while -60dBm is good.Link The data rate at which the radios are communicating
Chapter 3 — Configuring the CK32 I-SafeCK32 I-Safe Handheld Computer User’s Manual 51WiFi ScanUse the WiFi Scan tab to scan your network and bring back information about any access points with which you can communicate. Tap  Scan, then wait for the table to fill with information. Tap any of the columns to sort by ascending or descending order. Tap the slider bar on the bottom to scroll left and right to view all of the information.WiFi Scan Tab ContentsScanSSID The SSID broadcast from the access pointSignal The RSSI seen from the access pointChannel Channel on which client radio is communicating with access pointBSSID The MAC address for the access point radioPrivacy “Y” - WEP, TKIP, or AES encryption is being used; “N” - no encryption is being used
Chapter 3 — Configuring the CK32 I-Safe52 CK32 I-Safe Handheld Computer User’s ManualSupplicantThe Supplicant tab provides you with security and authentication information configured elsewhere in the CK32 I-Safe.SuppSupplicant Tab ContentsSupplicant Tab ContentsSupplicantService Status ON: Intermec Funk Security is enabledOFF: Microsoft Security is enabledStarting Up:Shutting Down:Unknown/Undefined:Authentication State: authenticated: Authentication Server successfulauthentication failed: Previous authentication attempt faileddisconnected: No authentication used, Open or Static WEP connection usedacquired: Access point located, authentication process not initiatedauthenticating: Attempting authentication with Authentication Serverlogoff: Current session terminated by supplicantunknown: Error occurred, but not defined
Chapter 3 — Configuring the CK32 I-SafeCK32 I-Safe Handheld Computer User’s Manual 53• Click Configure Profile to launch the Profile Wizard and configure 802.11 options. • Click Reconnect to disassociate the radio, momentarily dropping its connection. The radio then reassociates and reauthenticates, but does not do anything with the radio driver.• Click Clear Events to remove the information shown in the Supplicant Event box.Authentication Result success: Authentication successfultime-out: Authentication Server not responding to requests, you may be out of rangeno credentials: Proper credentials not configured in deviceclient reject: Unable to validate access point certificateserver reject: Authentication Server rejects submitted credentialsunknown: No authentication used or in the process of authenticationSupplicant Events Displays output from the supplicant detailing its status.Intermec Supplicant Version Version of Intermec Funk Security in the CK32 I-SafeSupplicant Tab Contents (continued)
Chapter 3 — Configuring the CK32 I-Safe54 CK32 I-Safe Handheld Computer User’s ManualPingUse the Ping tab to contact with any host in your network for information.Ping Tab Contents1From the Host drop-down list, select an IP address for the host you want to ping. Enter a new IP address using the input panel or the keypad. Select Clear List to remove all the IP addresses from the drop-down list.2From the Repetitions drop-down list, select the number of times to ping the selected host. These repetitions are done once per second.PingTiming Statistics Min: The shortest ping reply in milliseconds (ms)Max: The maximum ping reply in millisecondsAvg: The average ping reply timeCount: The number of pings already completedTimeouts: The number of pings that did not receive a responseBSSID The MAC address for the access point radioChannel: The channel on which the access point is communicatingRSSI The RSSI seen on the access pointLink The speed at which the last ping occurred.
Chapter 3 — Configuring the CK32 I-SafeCK32 I-Safe Handheld Computer User’s Manual 553Tap  Ping to initiate contact with the selected host4Depending on how the screen is set up, you can toggle between a graph and a list of ping results:•Tap Graph to toggle to the graphical view of 25 of the most recent pings and their response results, like in the following sample graph:Note the size of the gray area represents the standard deviation from the mean.•Tap List to toggle to detailed information showing what ping touched what host and its RTT (Round Trip Time).Supplicant LoggingIf you reach a situation where you need to send in debug information to Intermec Product Support or Intermec Engineering, you can use the Intermec Funk Security logging feature.1Tap the Supplicant tab, then tap Configure Profile to access the Profile Wizard.2Tap  Edit Selected Profile, then tap the Advanced tab.Check Enable Logging, tap ok to close the profile settings, then tap ok to close the Profile Wizard.
Chapter 3 — Configuring the CK32 I-Safe56 CK32 I-Safe Handheld Computer User’s ManualThe debug output file is then stored in the “\My Device” root folder as a text file called “uroddsvc.” Using File Explorer, press and hold your stylus on this file for its pop-up menu, then select any of its options to copy, beam, send, or delete this file.Configuring Security on the CK32 I-SafeThe CK32 I-Safe provides three types of security for your wireless network:• Wi-Fi Protected Access (WPA)• 802.1x•WEPThis section explains how to configure security on your wireless CK32 I-Safe. If you choose not to use security, see  “Disabling Security” on page 79. Intermec always recommends that you implement security.You must use either Funk or Microsoft security to implement your security solution. For details, see  “Choosing Between Funk and Microsoft Security” on page 60.
Chapter 3 — Configuring the CK32 I-SafeCK32 I-Safe Handheld Computer User’s Manual 57If you are using WPA-802.1x, WPA2-802.1x, or 802.1x security, this section assumes that your authentication server and authenticators are properly configured.Understanding the Wireless NetworkYour wireless radio adapter (network interface card) connects to wireless networks of two types: infrastructure and ad-hoc networks.• Infrastructure networks get you onto your corporate network and the internet. The CK32 I-Safe establishes a wireless connection to an access point, which links you to the rest of the network. When you connect to a network using an access point, you are using the 802.11 b/g infrastructure mode.• Ad-hoc networks are private networks shared between two or more clients.Each wireless network is assigned a name or SSID (Service Set Identifier) to allow multiple networks to exist in the same area without infringing on each other.Intermec recommends using security with wireless networks to prevent unauthorized access to your network and to ensure the privacy of transmitted data. Authentication by both the network and the user are required elements for secure networks. Use the following table to understand some of the wireless network terminology.Using WPA SecurityWi-Fi Protected Access (WPA) is a strongly enhanced, interoperable Wi-Fi security that addresses many of the vulnerabilities of Wired Equivalent Privacy (WEP). Instead of WEP, WPA uses Temporal Key Integrity Protocol (TKIP) for its data encryption method.Currently, WPA satisfies some of the requirements in the IEEE 802.11i draft standard. When the standard is finalized, WPA will maintain forward compatibility. Note: Your security choice does not depend on your authentication server. For example, you can choose Funk security if you use Microsoft’s Internet Authentication Service.
Chapter 3 — Configuring the CK32 I-Safe58 CK32 I-Safe Handheld Computer User’s ManualWPA runs in 802.1x (Enterprise) mode or PSK (Pre-Shared Key) mode: • In Enterprise mode, WPA provides user authentication using 802.1x and an Extensible Authentication Protocol (EAP). That is, an authentication server (such as a RADIUS server) must authenticate each device before the device can communicate with the wireless network.• In PSK mode, WPA provides user authentication using a shared key between the authenticator and the CV30. WPA-PSK is a good solution for small offices or home offices that do not want to use an authentication server.To use WPA security, you need:• an authentication server (Enterprise mode only).• an access point with an 802.11 b/g radio that supports WPA.• a CK32 I-Safe with the 802.11b/g radio and the 802.1x/WPA security option.The CK32 I-Safe also supports Wi-Fi Protected Access 2 (WPA2) if you are using Funk security. WPA2 uses an Advanced Encryption Standard (AES) for data encryption.WPA2 runs in 802.1x (Enterprise) mode or PSK (Pre-Shared Key) mode:• For WPA2-802.1x mode, WPA2 requires authentication in two phases; the first is an open system authentication and the second uses 802.1x and an Extensible Authentication Protocol (EAP) authentication method.• In PSK mode, WPA2 provides user authentication using a shared key between the authenticator and the CK32 I-Safe. WPA2-PSK is a good solution for small offices or home offices that do not want to use an authentication server.Using Static WEP SecurityThe CK32 I-Safe uses the Wired Equivalent Privacy (WEP) protocol to add security to your wireless network based on the 802.11 standard.
Chapter 3 — Configuring the CK32 I-SafeCK32 I-Safe Handheld Computer User’s Manual 59To use WEP security, you need:• a CV30 with an 802.11b/g radio.• an access point with an 802.11b/g radio.Using 802.1x Security802.1x security provides centralized user authentication using an authentication server, authenticators (access points), and supplicants. These components communicate using an EAP authentication type, such as TLS (Transport Layer Security) or PEAP (Protected Extensible Authentication Protocol). 802.1x security provides data encryption using dynamic WEP key management.To use 802.1x security, you need:• an access point with an 802.11b/g radio.• a CK32 I-Safe with an 802.11b/g radio and the 802.1x/WPA security option.• an authentication server.Using LEAP SecurityLightweight Extensible Authentication Protocol (LEAP), also known as Cisco-Wireless EAP, provides username/password-based authentication between a wireless client and a RADIUS server. In the 802.1x framework, traffic cannot pass through an Ethernet hub or wireless network access point until it successfully authenticates itself.The station must identify itself and prove that it is an authorized user before it is actually allowed to use the LAN. LEAP also delivers a session key to the authenticated station, so that future frames can be encrypted with a key that is different than keys used by other sessions.To use LEAP security, you need:• a RADIUS server.• Cisco access points.LEAP security is not supported with Microsoft security.
Chapter 3 — Configuring the CK32 I-Safe60 CK32 I-Safe Handheld Computer User’s ManualChoosing Between Funk and Microsoft SecurityThe CK32 I-Safe provides both Funk and Microsoft security choices. Funk security is the default setting. Use the following sections to set security using either Funk or Microsoft as your security choice. Both security choices offer similar features, but Funk security also offers these features:• CCX v2.0 compliance• Support for LEAP, TTLS, and FAST• Configuration of up to four profilesIf you want to use the default Funk security, you need to select a profile. For help, see one of the following sections, “Configuring Funk Security Using Intermec Settings.” or “Configuring Funk Security Using the Profile Wizard.”If you want to use Microsoft security, you need to select it as your security choice. For help, see  “Configuring Microsoft Security” on page 73.Configuring Funk Security Using Intermec SettingsYou can define up to four profiles for Funk security. Different profiles let your CK32 I-Safe communicate in different networks without having to change all of your security settings. For example, you may want to set up one profile for the manufacturing floor and one for the warehouse. By default, the active profile is Profile_1.To select a profile for Funk security1Select Start > Settings > the System tab > Intermec Settings.2Select Communications > 802.11 Radio > Funk Security.3Select Active Profile, choose a profile from the list, and save your settings.4Tap the active profile to expand it.5(Optional) Give your profile a meaningful name:aSelect Profile Label and a text box appears.bSelect the text in the box, type a meaningful name, and save your settings.
Chapter 3 — Configuring the CK32 I-SafeCK32 I-Safe Handheld Computer User’s Manual 616Select one profile as the active profile by tapping Active Profile and choosing a profile fro the drop-down list.7Save your settings.Configuring WPA Security With Funk SecurityUse these procedures to set WPA-802.1x, WPA2-802.1x, WPA-PSK, or WPA2-PSK security on your CK32 I-Safe with Funk security.To configure WPA-802.1x with Funk security1Open Intermec Settings.2Make sure you have configured the communications and radio parameters on your CK32 I-Safe.3Make sure you have selected Funk as your security choice.4Open Intermec Settings.5Choose Communications > 802.11 Radio > Funk Security > Profile.6For Association, choose WPA or WPA2 and press Enter. Encryption automatically defaults to TKIP if you are using WPA. Encryption automatically defaults to WEP if you are using Shared.7For 8021x, choose TTLS, PEAP, EAP-FAST, or TLS and press Enter.If you choose TTLS or PEAP:aFor Prompt for Credentials, choose Enter credentials now.bSelect User name and type your user name.cSelect User Password and type a user password.dFor Validate Server Certificate, choose Yes.Note: You can use Prompt for credentials to troubleshoot your connection to the network if you have problems. By choosing Enter credentials now, you are storing the user name and password on the device so that you will not need to enter it every time.
Chapter 3 — Configuring the CK32 I-Safe62 CK32 I-Safe Handheld Computer User’s ManualIf you choose TLS:aLoad a user and root certificate on your CK32 I-Safe. For help, see  “Loading a Certificate” on page 76.bFor Validate Server Certificate, choose Yes.cYou must enter a User Name and Subject Name. You can also enter a Server Common Name if you want to increase your level of security.8Save your settings.To enable WPA-PSK or WPA2-PSK with Funk security1Open Intermec Settings.2Make sure you have configured the communications parameters and selected Funk as your security choice.3Make sure you have selected Funk as your security choice.4Open Intermec Settings.5Choose Communications > 802.11 Radio > Funk Security > Profile.6For Association, choose WPA or WPA2.7For 8021x, choose None.8For Pre-Shared Key, enter the pre-shared key or the passphrase.The pre-shared key may be given in hexadecimal by prefixing a string of 64 hex digits with 0x for a total of 66 characters, or by entering a passphrase of 8 to 63 characters.The pre-shared key value must exactly match the key on the authenticator.9Save your settings.Configuring 802.1x Security With Funk Security1Open Intermec Settings.Note: You must have the date on the CK32 I-Safe set correctly when you enable Validate Server Certificate.
Chapter 3 — Configuring the CK32 I-SafeCK32 I-Safe Handheld Computer User’s Manual 632Make sure you have configured the communications and radio parameters on your CK32 I-Safe. 3Make sure you have selected Funk as your security choice.4Choose Communications > 802.11 Radio > Funk Security > Profile.5For Association, choose Open.6For Encryption, choose WEP.7For Inner Authentication, choose TTLS, PEAP or TLS.If you choose TTLS or PEAP:aSelect User name and type your user name.bSelect Password prompt, and choose Enter password now.cSelect User Password and type a user password.dFor Validate Server Certificate, choose Enabled.If you choose TLS:aLoad a user and root certificate on your CK32 I-Safe. For help, see  “Loading a Certificate” on page 76.bFor Validate Server Certificate, choose Yes.cYou must enter a User Name and Subject Name. You can also enter a Server Common Name if you want to increase your level of security.8Save your settings.Configuring LEAP Security on the CK32 I-Safe1Open Intermec Settings.1Make sure you have selected Funk as your security choice. 2Make sure you have configured the communications parameters and selected Funk as your security choice.Note: You can use Prompt for password to troubleshoot your connection to the network if you have problems.
Chapter 3 — Configuring the CK32 I-Safe64 CK32 I-Safe Handheld Computer User’s Manual3From Intermec Settings, choose Communications > 802.11 Radio > Funk Security > Profile.4For 8021x, choose LEAP.5For Association, choose Open, WPA, WPA2, or Network EAP. Encryption automatically defaults to TKIP if you choose WPA, to AES if you choose WPA2, and to WEP if you choose Open or Network EAP.6For Prompt for Credentials, select Enter credentials now.7Select User name and type your user name.8Select User Password and type your user password.9Save your settings.Configuring Static WEP Security With Funk Security1Open Intermec Settings.2Make sure you have configured the communications parameters and selected Funk as your security choice. 3Choose Communications > 802.11 Radio > Funk Security > Profile.4For Association, choose Open.5For Encryption, choose WEP.6For 8021x, choose None.7Define a value for the keys you want to use. You can define up to four keys (Key 1 through Key 4).Enter an ASCII key or a hex key that is either 5 bytes or 13 bytes long depending on the capability of the radio. Set a 5-byte value for 64-bit WEP or a 13-byte value for 128-bit WEP. Hex keys must be preceded by 0x and contain 5 or 13 hex pairs.8For Tran smit key, choose the key you want to use for transmitting data.9Save your settings.
Chapter 3 — Configuring the CK32 I-SafeCK32 I-Safe Handheld Computer User’s Manual 65Configuring Funk Security Using the Profile WizardYou can start 802.11 b/g communications on the CK32 I-Safe using the Profile Wizard. A profile contains all the information necessary to authenticate you to the network, such as login name, password or certificate, and protocols by which the CK32 I-Safe is authenticated. You can have up to four profiles for different networks. For example, you may have different login names or passwords on different networks.To select a profile for Funk security1Open Intermec Settings.2Select Start > Settings > the Systems tab > Wireless Network.orTap the iConnect icon (  ) icon in the lower right corner of the screen and select Too l s  > Wireless Settings.The Profile Wizard appears on the screen.3From the Profile list, select the profile you want to configure4Tap  Edit Selected Profile.5(Optional) Give your profile a meaningful name by selecting the text in the Profile Label text box and typing a meaningful name.
Chapter 3 — Configuring the CK32 I-Safe66 CK32 I-Safe Handheld Computer User’s Manual6From the Network type list, select either Infrastructure or Ad-Hoc. Select Infrastructure if the network uses access points to connect to the corporate network or internet. Select Ad-Hoc to set up a private network with one or more participants.7Enter the SSID (Network Name) if different than the profile name.8Tap  OK.Configuring WEP Security With Profile Wizard1In the Profile Wizard, select the Security page.2For 8021x Security, choose None.3For Association, choose Open or Shared to match the settings on your access point.4For Encryption, choose WEP.5From the Data TX Key list, select the key you want to use for transmitting data.6Define a value for the keys you want to use. You can define up to four keys (Key 1 through Key 4).Enter an ASCII key or a hex key that is either 5 bytes or 13 bytes long depending on the capability of the radio. Set a 5-
Chapter 3 — Configuring the CK32 I-SafeCK32 I-Safe Handheld Computer User’s Manual 67byte value for 64-bit WEP or a 13-byte value for 128-bit WEP. Hex keys must be preceded by 0x and contain 5 or 13 hex pairs.7Tap  OK.Configuring WPA-PSK Security With Profile Wizard1In the Profile Wizard, select the Security page.2For 8021x Security, choose None.3For Association, choose WPA.4For Pre-Shared Key field, enter the passphrase as ASCII. The passphrase must be 8 to 63 characters and match the passphrase on the access point.5Tap  OK.Configuring WPA2-PSK Security With Profile Wizard1In the Profile Wizard, select the Security page.2For 8021x Security, choose None.3For Association, choose WPA2.4For Pre-Shared Key field, enter the passphrase as ASCII. The passphrase must be 8 to 63 characters and match the passphrase on the access point.5Tap  OK.
Chapter 3 — Configuring the CK32 I-Safe68 CK32 I-Safe Handheld Computer User’s ManualConfiguring PEAP Security With Profile WizardProtected EAP (PEAP) performs secure authentication against Windows domains and directory services. It is comparable to EAP-TTLS, though not as flexible.To configure PEAP security1In the Profile Wizard, select the Security page.2For 8021x Security, choose PEAP.3For Association, choose Open, WPA, or Network EAP.4For Encryption, choose TKIP if you selected WPA for association, or WEP if you selected Network EAP for association.5For Username, type a unique username for this protocol.6Select Prompt for password to have the user enter this password each time to access the protocol, or select Use following password to use the protocol without entering a password each time you use the CK21 I-Safe.7In the Password field, type a unique password for this protocol.8Tap  Get Certificates to obtain or import server certificates. For help with certificates, see  “Loading a Certificate” on page 76.
Chapter 3 — Configuring the CK32 I-SafeCK32 I-Safe Handheld Computer User’s Manual 699Tap  Additional Settings to assign an inner PEAP authentication and set options for server certificate validation and trust.10 From the Inner PEAP Authentication list, choose EAP/MS-CHAP-V2, EAT/Token Card, or EAP/MD5-Challenge.11 Check Validate Server Certificate to verify the identity of the authentication server based on its certificate when using PEAP.12 Tap  Root CA, select a root certificate, and then tap OK.13 Enter the Common Names of trusted servers.14 Tap  OK.Configuring TLS Security With Profile WizardEAP-TLS is a protocol based on the Transport Layer Security (TLS) protocol widely used to secure web sites. This protocol requires both the user and authentication server to have certificates for mutual authentication.To configure TLS security1In the Profile Wizard, select the Security page.2For 8021x Security, choose TLS.3For Association, choose Open, WPA, WPA2, or Network EAP.4For Encryption, choose TKIP or AES if you selected WPA2 for association, or WEP or CKIP if you selected Network EAP for association.5For Username, type a unique username for this protocol.6Select Prompt for password to have the user enter this password each time to access the protocol, or select Use following password to use the protocol without entering a password each time you use the CK32 I-Safe.7In the Password field, type a unique password for this protocol.8Tap  Get Certificates to obtain or import server certificates. For help with certificates, see  “Loading a Certificate” on page 76.
Chapter 3 — Configuring the CK32 I-Safe70 CK32 I-Safe Handheld Computer User’s Manual9Tap  Additional Settings to Certificate Settings.10 Check Validate Server Certificate to verify the identity of the authentication server based on its certificate when using TLS.11 Tap  Root CA, select a root certificate, and then tap OK.12 Enter the Common Names of trusted servers.13 Tap  OK.Configuring TTLS Security With Profile WizardTTLS protocol provides authentication like EAP-TLS but does not require user certificates. User authentication is done using a password or other credentials that are transported in a securely encrypted “tunnel” established using server certificates.To configure TTLS security1In the Profile Wizard, select the Security page.2For 8021x Security, choose TTLS.3For Association, choose Open, WPA, WPA2, or Network EAP.4For Encryption, choose TKIP or AES if you selected WPA2 for association, or WEP or CKIP if you selected Network EAP for association.5For Username, type a unique username for this protocol.6In the Password field, type a unique password for this protocol.7Select Prompt for password to have the user enter this password each time to access the protocol, or select Use following password to use the protocol without entering a password each time you use the CK32 I-Safe.8(Optional) Tap Get Certificates to obtain or import server certificates. For help with certificates, see  “Loading a Certificate” on page 76.9Tap  Additional Settings to assign an inner TTLS authentication, inner EAP, and set options for server certificate validation and trust.
Chapter 3 — Configuring the CK32 I-SafeCK32 I-Safe Handheld Computer User’s Manual 7110 From the Inner TTLS Authentication list, choose PAP, CHAP, MS-CHAP, MS-CHAP-V2, PAP/Token Card, or EAP.11 If you select EAP for the inner authentication protocol, select an inner EAP protocol from the Inner EAP list.12 Check Validate Server Certificate to verify the identity of the authentication server based on its certificate when using PEAP.13 Tap  Root CA, select a root certificate, and then tap OK.14 Enter the Common Names of trusted servers.15 For Anonymous EAP-TTLS Name, type an outer identity to protect your login name or identity.16 Tap  OK.Configuring LEAP Security With Profile WizardLEAP is the Cisco Lightweight version of EAP.To configure LEAP security1In the Profile Wizard, select the Security page.2For 8021x Security, choose LEAP.3For Association, choose Open, WPA, WPA2, or Network EAP.
Chapter 3 — Configuring the CK32 I-Safe72 CK32 I-Safe Handheld Computer User’s Manual4For Encryption, choose TKIP or AES if you selected WPA2 for association, or WEP or CKIP if you selected Network EAP for association.5For Username, type a unique username for this protocol.6In the Password field, type a unique password for this protocol.7Select Prompt for password to have the user enter this password each time to access the protocol, or select Use following password to use the protocol without entering a password each time you use the CK32 I-Safe.8Tap  OK.Configuring EAP-FAST with Profile WizardThe EAP-FAST protocol is a client-server security architecture that encrypts EAP transactions with a TLS tunnel. While similar to PEAP, EAP-FAST differs significantly since tunnel establishment is based on strong secrets unique to users. These secrets are called Protected Access Credentials (PACs), which CiscoSecure ACS generates using a master key known only to CicsoSecure ACS. EAP-FAST does not require certificate management.1In the Profile Wizard, select the Security page.2For 8021x Security, choose EAP-FAST.3For Association, choose Open, WPA, WPA2, or Network EAP.4For Encryption, choose WEP or CKIP if you selected Network EAP for association.5For Username, type a unique username for this protocol.6In the Password field, type a unique password for this protocol.7Select Prompt for password to have the user enter this password each time to access the protocol, or select Use following password to use the protocol without entering a password each time you use the CK32 I-Safe.8Tap Additional Settings to set options for PAC management and assign an anonymous EAP-FAST name.
Chapter 3 — Configuring the CK32 I-SafeCK32 I-Safe Handheld Computer User’s Manual 739Tap  PAC Manager to view the PAC files currently installed on the CK32 I-Safe. Tap ok to return to the Additional Settings screen.10 If you already have a PAC on the CK32 I-Safe, clear Allow Automatic PAC provisioning to avoid receiving more PACs from the server.11 If Allow Automatic PAC provisioning is selected, you can check:•Prompt before acquiring a new PAC for notification of any incoming PACs.•Prompt before replacing a PAC for notification whether to replace a current PAC with an incoming PAC.12 For Anonymous EAP-FAST Name, type the outer identity assigned for public usage.13 Tap  OK.Configuring Microsoft SecurityThe default security setting is Funk. If you want to use Microsoft security, you need to select it as your security choice. After you select Microsoft as your security choice, you will be prompted to save your settings and reset your computer for your change to take effect.To select Microsoft security as your security choice1Select Start > Settings > the System tab > Intermec Settings. The Intermec Settings application appears.2Select Communications > 802.11 Radio > Security Choice.
Chapter 3 — Configuring the CK32 I-Safe74 CK32 I-Safe Handheld Computer User’s Manual3From the Security Choice list, select Microsoft Security and save your settings. An alert box appears telling you that you must save your settings and warm boot the CV30 for the new security choice to take effect. 4An alert box appears telling you that you must save your settings and warm boot the CK32 I-Safe for the new security choice to take effect. Tap Yes to warm boot the CK32 I-Safe with Microsoft Security as the Security Choice.
Chapter 3 — Configuring the CK32 I-SafeCK32 I-Safe Handheld Computer User’s Manual 75Networks already configured are preferred networks. You can connect to only preferred networks or search for and connect to any available network.You can add a wireless network when the network is detected or manually by entering settings information. To determine if authentication information is needed, see your network administrator.When the CK32 I-Safe restarts with Microsoft selected as the security choice, a dialog box with your wireless network information appears. You can connect to an existing preferred connection or set up a new connection. The following information is for setting up a new connection.To configure Microsoft security for a new connection1In the radio network connection dialog box, double-tap Add New.2Enter a network name. If the network was detected, the network name is entered and cannot be changed.3(Optional) To connect to an ad-hoc connection, select This is a computer-to-computer (ad-hoc) network; wireless access points are not used.4Follow these steps to disable authentication:aSet Authentication to Open if WEP keys are not required or to Shared when WEP keys are required for association.bSet Data Encryption to Disabled.Follow these steps to enable WEP encryption:aSet Authentication to Open if WEP keys are not required or to Shared when WEP keys are required for association.bSet Data Encryption to WEP.cTo change the network key, clear The key is provided automatically check box, enter the new Network key, and then select the appropriate Key index.Follow these steps to enable WPA authentication:aSet Authentication to WPA.bSet Data Encryption to either WEP or TKIP.
Chapter 3 — Configuring the CK32 I-Safe76 CK32 I-Safe Handheld Computer User’s ManualFollow these steps to enable WPA authentication using a preshared key:aSet Authentication to WPA-PSK.bSet Data Encryption to either WEP or TKIP.cEnter the new Network key.5From the EAP type list, select either MD5-Challenge, PEAP or TLS.6Tap  OK to close the screen.Loading a CertificateIf you choose to use transport layer security (TLS) with WPA or 802.1x security, you need to have a unique client certificate on the CK32 I-Safe and a trusted root certificate authority (CA) certificate. You can use a third-party CA to issue unique client certificates and a root certificate.There are three ways to load certificates on the CK32 I-Safe:• If you are using Active Directory to issue certificates, you can use the Enroll Certificates application to load the certificates. • If you are using another third-party CA, you can use the Import Certificates application to load the certificates.• If you have multiple certificates to install, you can use the Import Root Certificates and Import User Certificates functions.To load certificates if you are using Active Directory1Configure the network and radio settings for the CK32 I-Safe to communicate with your certificate authority or establish an ActiveSync connection with the CA.Note: If you select to automatically connect to non-preferred networks, the CK32 I-Safe detects any new networks and provides you with the opportunity to configure them.Note: For certificates to be valid, the CK32 I-Safe must be set to the correct date and time. After cold booting the CK32 I-Safe, you may need to correct the date and time.
Chapter 3 — Configuring the CK32 I-SafeCK32 I-Safe Handheld Computer User’s Manual 772From Intermec Settings, select Communications > 802.11 Radio > Certificates.3Select Enroll Certificates and tap the Run App button. The Enroll Certificates dialog box appears.4In the Enroll Certificates dialog box, enter the User Name, Password, and Server (IP address) to log into the CA server. 5Tap  OK. A dialog box appears asking if you want to load the root certificate.6Tap  OK for yes. The Enrollment Tool message box appears telling you that the user certificate has been added.7Tap  OK to close the Enrollment Tool message box.8Configure your CK32 I-Safe for WPA, or 802.1x security.To load certificates if you are using a third-party CA1From Intermec Settings, select Communications > 802.11 Radio > Certificates. 2Select Import Certificates and tap the Run App button. The certificates application appears.3Tap   in the Import pfx Certificate box and navigate to your private .pfx file. 4Select the file and the path to your .pfx file now appears in the text box.5Tap  Import Certificate. A dialog box appears asking if you want to add the certificate to the root store.6Press OK to add the certificate. A message box appears telling you that the root certificate has been imported.7Tap  OK to close the Success message box.8Tap  Import User Cert. A dialog box appears telling you that the user certificate and the associated key were successfully imported.9Tap  OK to close the Success message box.10 Configure your CK32 I-Safe for WPA, or 802.1x security.
Chapter 3 — Configuring the CK32 I-Safe78 CK32 I-Safe Handheld Computer User’s ManualTo load multiple certificates 1Create the \Temp\Root and the \Temp\User folders on the CK32 I-Safe. 2Copy at least one root certificate .cer file into the \Temp\Root folder. 3Copy at least one user certificate .cer file and key .pvk file into the \Temp\User folder. The filenames must match (for example, cert1.cer and cert1.pvk).4From Intermec Settings, select Communications > 802.11 Radio > Certificates.5Select Import Root Certificates = False. Choose True  from the drop-down menu.6Select Import User Certificates = False. Choose True  from the drop-down menu.7Exit Intermec Settings and save your settings. The certificates are immediately imported:aAll root certificates in \Temp\Root are imported into the Trusted Authorities certificate store.bAll certificate and key files in \Temp\User are imported into the My Certificates certificate store.cThe Import Root Certificates and the Import User Certificates settings are changed from True  to False.8Configure your CK32 I-Safe for WPA, or 802.1x security.Note: You are prompted when a root certificate is imported, unless that certificate is already in the store.
Chapter 3 — Configuring the CK32 I-SafeCK32 I-Safe Handheld Computer User’s Manual 79Disabling SecurityIf you choose not to use security with your wireless network, you can disable it on the CK32 I-Safe. Intermec recommends that you always set security in your network.To disable security 1Open Intermec Settings.2Choose Communications > 802.11 Radio > Microsoft Security.3For Network Authentication, choose Open.4For Data Encryption, choose Disabled.5Close Intermec Settings.
Chapter 3 — Configuring the CK32 I-Safe80 CK32 I-Safe Handheld Computer User’s Manual
CK32 I-Safe Handheld Computer Users Manual 814Developing and Installing ApplicationsUse this chapter to understand the guidelines for developing applications and converting existing Trakker Antares applications for use on the CK32 I-Safe. You will also find information on installing applications and automatically launching them. This chapter contains these sections:• Developing Applications for the CK32 I-Safe• Installing Applications on the CK32 I-Safe• Launching an Application Automatically
Chapter 4— Developing and Installing Applications82 CK32 I-Safe Handheld Computer Users ManualDeveloping Applications for the CK32 I-SafeThe CK32 I-Safe Handheld Computers run applications programmed in Microsoft Visual Studio 2003 or later. You can also use Microsoft eMbedded Visual C++ version 4.2 or later, but some features may not be available. Use this section to understand the hardware and software you need to:• develop a new application for the CK32 I-Safe.• develop a web-based application for the CK32 I-Safe.• convert a Trakker Antares application to a CK32 I-Safe application.Developing a New Application Using the Intermec Developer LibraryUse the Intermec resource kits to develop new applications to run on the CK32 I-Safe. The Intermec resource kits are a library of C#, C++, and .NET components grouped by functionality that you can use to create applications for the CK32 I-Safe. The resource kits are part of the Intermec Developer Library (IDL), and can be downloaded from the Intermec web site at www.intermec.com/idl.At a minimum, you need the following hardware and software components to use the Intermec resource kits:• Pentium PC, 400 MHz or higher• Windows 2000 (Service Pack 2 or later) or Windows XP (Home, Professional, or Server)• For native and managed development, Microsoft Visual Studio 2005• 128 MB RAM (196 MB recommended)• 360 MB hard drive space for minimum installation (720 MB for complete)• CD-ROM drive compatible with multimedia PC specification• VGA or higher-resolution monitor (Super VGA recommended)• Microsoft Mouse or compatible pointing device
Chapter 4 — Developing and Installing ApplicationsCK32 I-Safe Handheld Computer Users Manual 83Developing a Web-Based ApplicationYou can develop web-based data collection applications for use on the CK32 I-Safe. For help, see any HTML source book. The CK32 I-Safe contains Internet Explorer Mobile for you to use. Microsoft Internet Explorer Mobile is available from the Start menu and provides all of the common elements you expect to find.Converting a Trakker Antares Application for the CK32 I-SafeIf you have an existing Trakker Antares application that you would like to run on the CK32 I-Safe, you can use the Antares Migration Resource Kit to convert it. The Antares Migration Resource Kit is a set of libraries and tools that you use to convert your existing Trakker Antares C applications into C++ applications for use on the CK32 I-Safe.The CK32 I-Safe does not support all Trakker Antares functions. You may need to rewrite parts of your application when converting it for use on the CK32 I-Safe. See the resource kit for a list of functions that are not supported.You need these hardware and software components to use the resource kit:• PC with at least 100 MB of free disk space running Microsoft Windows 2000/XP• Microsoft Visual Studio 2003 (or later)• Microsoft eMbedded Visual C++ version 4.2 or later• Antares Migration Resource Kit (from IDL 2.4 or later)The resource kit is part of the Intermec Developer Library (IDL), which you can download from the Intermec web site at www.intermec.com/idl.
Chapter 4— Developing and Installing Applications84 CK32 I-Safe Handheld Computer Users ManualInstalling Applications on the CK32 I-SafeThere are several ways you can install applications on the CK32 I-Safe: • You can package your application as a cabinet (.cab) file.• If you have a simple application, you may only need to deliver the .exe file.• You can copy a directory structure that contains the application, supporting files, DLLs, images, and data files.Intermec recommends using .cab files to install your applications. The CK32 I-Safe uses standard Windows Mobile .cab files and will install third-party .cab files. You can have your .cab files place your application in any of these memory locations on the CK32 I-Safe: • Applications can be installed into the Object Store or the Flash File Store.  Both locations are virtual partitions on the embedded storage card in the system.  The Object Store will be erased during a ‘clean’ boot, but the Flash File store will persist.  Neither location will be erased during a normal reset of the system.  The registry always persists to the Object Store region for normal resets.  If you need files and/or registry entries to persist through a ‘clean’ boot, it is suggested that you use a cab file installed from the Flash File Store area.  For more information on ‘clean’ boots, see “Resetting Your Computer” on page 110.There are several ways you can install files and applications on the CK32 I-Safe:• SmartSystems server•ActiveSync• Wavelink AvalancheThe following sections explain how to use each one of these processes to install your application on the CK32 I-Safe.
Chapter 4 — Developing and Installing ApplicationsCK32 I-Safe Handheld Computer Users Manual 85Installing Applications Using SmartSystems FoundationYou can use the SmartSystems server to drag-and-drop Intermec applications onto your CK32 I-Safe. The CK32 I-Safe ships with the SmartSystems client, which means it is SmartSystems-enabled. The console is part of SmartSystems Foundation, which you can download from www.intermec.com/SmartSystems. For help using the console, see the online help.To install an application using SmartSystems Foundation1Download your application file to your desktop PC.2Double-click the application file to install it. The application file should appear in the software vault.3From the SmartSystems console in the Software Vault, drag-and-drop the application onto each CK32 I-Safe in your network.Installing Applications Using Microsoft ActiveSyncYou can use Microsoft ActiveSync to establish a connection between your PC and the CK32 I-Safe. ActiveSync transfers files, synchronizes files, performs remote debugging, and other device management activities. For more information on ActiveSync see “Using Microsoft ActiveSync” on page 32.You can have a USB or 802.11 b/g ActiveSync connection to the CK32 I-Safe. When you only have a few CK32 I-Safes to update, you can copy files using Windows Explorer on a PC.This procedure assumes that Microsoft ActiveSync is installed on your PC and is up and running.To install an application using ActiveSync1Use the AN1 Communications Adapter to connect the CK32 I-Safe to a PC or host via the USB port. You may have to disconnect and then connect the cable to “wake” the connection.Intrinsically Safe rules prohibit direct connection to the CK32 I-Safe.
Chapter 4— Developing and Installing Applications86 CK32 I-Safe Handheld Computer Users Manual2Wait for a “Connected” message to appear in the Microsoft ActiveSync application to signal a connection to the CK32 I-Safe. If necessary, select File > Get Connected to initiate a connection.3Click To o l s  > Explore Device to open the Mobile Device window on the CK32 I-Safe.4On your desktop PC, locate the .cab file you want to download to the CK32 I-Safe and copy it.
Chapter 4 — Developing and Installing ApplicationsCK32 I-Safe Handheld Computer Users Manual 875From the Mobile Device window, open the My Windows Mobile-Based Device folder and navigate to the folder where you want to paste the .cab file.6Paste the .cab file into the desired folder.7When you are done copying files, reset the CK32 I-Safe.8After the CK32 I-Safe is done resetting, tap Start > Programs > File Explorer to locate the newly copied files.9Tap the .cab files to install them.Installing Applications Using Wavelink AvalancheYou can use the Wavelink Avalanche device management system to install applications on all of your wireless CK32 I-Safes. The CK32 I-Safe ships with the Avalanche Enabler already loaded on it. In order to use Avalanche Enabler you must also have the Avalanche Administrative Console installed on your PC.To install Avalanche Enabler1Tap  Start > Programs > File Explorer and navigate to the Windows folder.2Locate and tap InstallSelect to launch the application
Chapter 4— Developing and Installing Applications88 CK32 I-Safe Handheld Computer Users Manual3Tap  OK on the Install Select Caution dialog.
Chapter 4 — Developing and Installing ApplicationsCK32 I-Safe Handheld Computer Users Manual 894Select Avalanche Enabler and tap the Apply button.5You will need to clean boot the CK32 I-Safe to install the selected files. Tap Yes to initiate a clean boot. For help, see “Performing a Clean Boot” on page 111.This completes the installation process for Install Select.Each time the Avalanche Enabler is activated (typically on a reset), the CK32 I-Safe attempts to connect to the Avalanche Agent. When the CK32 I-Safe connects to the agent, the agent determines whether an update is available and immediately starts the software upgrade, file transfer, or configuration update. You can now install software packages and updates for the CK32 I-Safe using the Avalanche Administrative Console. Schedule the CK32 I-Safe updates or manually initiate an update using the Avalanche Administrative Console.
Chapter 4— Developing and Installing Applications90 CK32 I-Safe Handheld Computer Users ManualFor more information on using Wavelink Avalanche, contact your local Intermec representative or visit the Wavelink web site at www.wavelink.com.Launching An Application AutomaticallyYou can configure the various media used in the Windows Mobile system with a folder name and can change the media in the registry of the system. Many of the startup components rely on folder names to locate information files, applications, or other related data.During normal Windows Mobile system startup, there are Intermec-specific and non-Intermec components that require an orderly start to properly function. These non-Intermec components may also need to start themselves so the Windows Mobile device can function properly. Since there are possible configurations that come from using one or more optional built-in peripheral devices, the platform components starting on the next page are required to manage startup.RunAutoRunSystem components are installed and configured during the power up process from a single starting point. RunAutoRun (RunAutoRun.exe), built into the operating system image and located in the “\Windows\Startup” folder, checks for AutoExec (AutoExec.exe) in a “2577” directory on a mounted volume in this order: miniSD, Object Store (or User Store), which may be non-volatile storage or RAM, and Flash File Store which may map as Object Store (default location for the AutoExec program in Intermec systems). Intermec system applications start from this folder. However, the ordering of mounted volumes does override this feature.Note: This describes the system component startup for Intermec provided components only. It does not describe the bootstrap loader process. It only describes the component installation process provided by Windows Mobile. It is assumed that you understand the Microsoft Mobile startup procedures and are familiar with how Microsoft components start up.
Chapter 4 — Developing and Installing ApplicationsCK32 I-Safe Handheld Computer Users Manual 91Folder names used for the mounted volumes above are retrieved from the registry to maintain coherence with the naming of the mounted volumes on the platform. These folder names are not hard-coded. If AutoExec is present in the “\SYSTEM” folder on any of these media, it executes the program only on the first media it is found on and no other.AutoExec is reserved for Intermec use to configure Intermec-specific applications. It launches the .cab installer, AutoCab (AutoCab.exe), to install platform .cab files to the system, such as the SSPB.When the AutoExec is complete, RunAutorun then checks for the existence of AutoRun (AutoRun.exe) and executes this program from the first media it is found on. This order is the same as what is used by AutoExec.AutoRun is reserved for customer use to configure application launch sequences. It launches the AutoCab installer and any customer programs added to the AutoUser.dat file. Shown is the hierarchy of these files.AutoExecAutoExec (AutoExec.exe) automates operations such as pausing, launching processes, or signaling, and is configured through the AutoExec data file (AutoExec.dat). This script file must be in the same directory as the program itself.Usage:AutoExec [-%[W]] [-E=["X"]] [-F=["Y"]] [-LOG=] [-W=[Z]]Note: Intermec considers the usage of the AutoExec data file as “Intermec Private.” AutoExec installs Intermec applications such as Data Collection, Security Supplicants, Intermec Management, applets, and shortcuts from components found in the Flash File System. Do not modify the AutoExec data file. Instead, use the AutoRun program to add software components.
Chapter 4— Developing and Installing Applications92 CK32 I-Safe Handheld Computer Users ManualAutoExec CommandsProcess return code uses standard error codes defined in WinError.h.AutoExec KeywordsCommand  Description-% Passes an ID to use in a call to SignalStarted. This argument is useful only during system startup that relies on a SignalStarted to call. W is an integer value.-E Passes a signal event name to use when autoexec completes. X is a string value.-F Overrides the data file to use. This must be a fully qualified name. Default is “autoexec.dat” in the same location as the AutoExec.exe program. “Y” is a string value.-LOG Set to any value logs activity to AutoExec.txt (in the same location as the AutoExec.exe program). Default is disabled.-W Pauses the autoexec process by calling sleep for the number of seconds specified by Z. Z is an integer value.Keyword  Description-% Passes an ID to use in a call to SignalStarted. This argument is useful only during system startup that relies on a SignalStarted to call. W is an integer value.-E Passes a signal event name to use when autoexec completes. X is a string value.-F Overrides the data file to use. This must be a fully qualified name. Default is “autoexec.dat” in the same location as the AutoExec.exe program. “Y” is a string value.-LOG Set to any value logs activity to AutoExec.txt (in the same location as the AutoExec.exe program). Default is disabled.-W Pauses the autoexec process by calling sleep for the number of seconds specified by Z. Z is an integer value.
Chapter 4 — Developing and Installing ApplicationsCK32 I-Safe Handheld Computer Users Manual 93There are two ways to automatically launch your application when you perform a reset on the CK32 I-Safe:• Make sure your .cab file places a shortcut to your application in the \Windows\StartUp folder.• Configure the AutoRun program to launch your application.The CK32 I-Safe contains a program called AutoRun.exe which automates operations such as launching other processes. You can configure AutoRun.exe through the AutoRun data file, AutoRun.dat. This script file must be located in the same directory as the program.AutoRunAutoRun (AutoRun.exe) automates operations such as launching other processes and is configured through the AutoRun data file (AutoRun.dat). This file must be in the same directory as the program itself.AutoRun supports the following script commands in AutoUser.dat and AutoRun.dat.Note: If you need to add steps at boot time, add them to AutoUser.dat, not to AutoRun.dat. AutoRun.dat is provided by Intermec and is subject to change. AutoUser.dat is the designated place to add steps to the boot time process.Command DescriptionEXEC Launches a specified program, waits for it to complete (up to 10 minutes).CALL Processes a specified file of commands and returns.CHAIN Processes a specified file of commands and does not return.RUN Loads a specified program and executes it.LOAD Loads a specified program and executes it.
Chapter 4— Developing and Installing Applications94 CK32 I-Safe Handheld Computer Users ManualAutoRun handles quoted file names for the first parameter to allow specifying path names or file names that contain white space. Note only one set of quotes per command is supported. AutoRun.dat entry examplesAutoRun supports the following script commands in AutoRun.dat:Examples of keyword usage:; Allow message pop up if an error occurs.QUIET 0Command DescriptionRUN “Flash File Store\Apps\some.exe” arg1, arg2, arg3CALL “Flash File Store\2577\usercmds.dat”AutoRun Script CommandsCommand DescriptionQUIET Enables user notification when an error occurs.LOGGING Enables logging to a trace file.SIGNAL Enables the specified named event and is immediately signaled. Useful for notifying other components of the current status.CALL Opens another .dat file to process. After the called file is completed, this file is resumed.RUN Runs a program with a SW_SHOWNORMAL attribute. Autoexec does not wait for the child process to exit.LOAD Runs a program with a SW_HIDE attribute. Autoexec waits for 60 seconds for the child process to exit or EXECWAIT seconds if set.EXEC Runs the specified program. AutoExec waits 60 seconds for the child process to exit or EXECWAIT seconds if set.EXECWAIT Changes the default EXEC wait time from 60 seconds to the number of seconds specified. There is a maximum 10-minute limit imposed.WAIT Forces a sleep for the specified number of seconds to occur.WAITFOR Forces a sleep until the named event is signaled.
Chapter 4 — Developing and Installing ApplicationsCK32 I-Safe Handheld Computer Users Manual 95; Log any debug output to a trace file.LOGGING 1; Perform a SetEvent on the event name "autoexec_started".SIGNAL "autoexec_started"; Include this child data file, childexec.dat.CALL "\childexec.dat"; Use autocopy to copy the audio control panel from flash file store to the windows directory. Wait for up to 60 seconds for it to exit.EXEC "\Flash File Store\SYSTEM\autocopy.exe" -S"\Flash File Store\System\CPLAudio.cpl" -D"\Windows\CPLAudio.cpl"; Change the default EXEC wait time to 90 seconds.EXECWAIT 90; Suspend processing any commands for 10 seconds.WAIT 10; Suspend processing any commands until event called MyEventName is signaled.WAITFOR "MyEventName"AutoCopyAutoCopy (AutoCopy.exe) copies/moves files between locations. It has no user interface and is configured through command line arguments. It has support for the following parameters, in no particular order:Usage: AutoCopy [-D["W"]] [-L["X"]] [-M[D]] [-Q[Y]] [-S["Z"]]AutoCopy Script CommandsProcess return code uses standard error codes defined in WinError.h.Command Description-D Indicates the destination file name and must be fully qualified. W is a string value.-L Indicates a fully qualified file name for logging to enable. Default is disabled. X is a string value.-M Moves file to a destination rather than copies the file. Default value is disabled. D is an integer value. D=1 indicates enabled, 0 is disabled.-Q Indicates if a message box should appear when an error occurs. Default is disabled. Y is an integer value.-S Indicates a source file name and must be fully qualified. Z is a string value.
Chapter 4— Developing and Installing Applications96 CK32 I-Safe Handheld Computer Users ManualExample:; use AutoCopy to copy the control panel from flash file store to windows. autocopy.exe -S"\Flash File Store\System\Audio.cpl" -D"\Windows\Audio.cpl"; use AutoCopy to move the control panel from flash file store to windows. autocopy.exe -M1 -S"\Flash File Store\System\Audio.cpl" -D"\Windows\Audio.cpl"AutoRegThe AutoReg (AutoReg.exe) component adds registry information to the Windows Mobile registry. It has no user interface and is configured through command line arguments. Usage: AutoReg [-D] [-HKey] [-Q] “filename”AutoReg Script CommandsProcess return code uses standard error codes defined in WinError.h.Example:; use AutoReg to install this registry information.autoreg.exe "\Flash File Store\install.reg"; use AutoReg to install this registry information. Delete the file afterwards.autoreg.exe -D "\Flash File Store\install.reg"; use AutoReg to extract registry information to a file. autoreg.exe -HHKEY_LOCAL_MACHINE\Software\Intermec\Version "\version.reg"Command Description-D Deletes the registry file after successfully loading it. This allows for systems that have hives implemented.-H Saves the registry path, and all child entries, to the specific .REG registry file.-Q Indicates whether a message box should appear when a fatal error occurs.filename Fully qualified file name to read from or write to, encased in double quotes to support spaces in paths or file names. See examples below.
Chapter 4 — Developing and Installing ApplicationsCK32 I-Safe Handheld Computer Users Manual 97The format of the input file, in this example, is the standard registry format which should ease the creation of the input file since there are many publicly available utilities to generate a registry file besides Notepad. One example of a tool is the Microsoft Remote Registry Editor.AutoCabAutoCab (AutoCab.exe) extracts files, registry settings, and shortcuts from Windows Mobile cabinet (.cab) files. The Windows Mobile startup sequence invokes AutoCab as a part of AutoExec and AutoRun. During the Windows Mobile startup sequence, AutoCab processes all CAB files in the “\CabFiles” directory relative to the current location of Autocab, unless the location is overridden by command line arguments. AutoCab can run as a stand-alone program to install a CAB file or a directory of CAB files.AutoCab only installs the CAB file if it was not installed before by AutoCab. To track the installation of a .cab file, AutoCab marks the .cab file with the System attribute. This attribute is ignored if the device is performing a clean-boot on a non-persistent file system.AutoCab preserves the .cab file after installation if the ReadOnly attribute is set. If not set, the .cab file is deleted automatically after installation. Command line switches are described as follows.Usage: AutoCab [-ChkRst=][-File=][-Force][-Log=][-Move=][-Quiet=][-Show=][-Signal=]If <PathName> references a single .cab file, that file is processed. If <PathName> references a directory, all the .cab files in that directory is processed. If <PathName> is a wild card pattern, all files matching that pattern is processed, If <PathName> is omitted, InstallCab processes all the .cab files in directory “\CabFiles.”
Chapter 4— Developing and Installing Applications98 CK32 I-Safe Handheld Computer Users ManualAutoCab Script CommandsExample:; Install all cab files in the \Flash File Store\XYZ directory, regardless.AutoCab -FILE="\Flash File Store\XYZ\.cab" -FORCE; Install only one cab file, use Intermec cab installation displayAutoCab -FILE=”\myCab\app.cab” =show=2Command Description-ChkRst= Set to 1 to configure AutoCab to check for the Reset flag after all .cab files are installed. This file is created by .cab files that want a clean reset after installation. Default is 0 (do not check for flag).-File= Specifies the .cab files to extract. Note that the specified files need not end with the .cab extension.-Force Forces the specified .cab files to extract regardless of whether it was previously extracted.-Log= Set to 1 to create a log file in the same folder that AutoCab is running. Useful for debugging .cab installation. Default is 0 (disabled).-Move= Set to 1 to force source .cab file deletion, even when read-only bit set on file. Default is 0 (disabled).-Quiet= Set to 0 to allow AutoCab to display user message box on errors. Useful for debugging .cab installation. Default is 1 (keep quiet).-Show= Set to 0 to prevent showing any installation progress interfaces and also prevents canceling the installation. Set to 1 to show normal installation. Set to 2 to show Intermec installation progress interface (user can see what is installing but cannot cancel it). Default is 1 (show normal).-Signal= Set to string name of signal to use at the completion of .cab installation before a reboot occurs (if enabled). AutoCab uses WaitForSingleObject on this name. Default is disabled.
CK32 I-Safe Handheld Computer User’s Manual 995Troubleshooting and MaintenanceUse this chapter to solve problems you may encounter while using the CK32 I-Safe. You will also find information on booting the computer and routine maintenance.If you have any problems using the CK32 I-Safe, look in this chapter to find a possible solution. This chapter consists of the following section.• Upgrading the CK32 I-Safe Using SmartSystems• Contacting Product Support• Troubleshooting the CK32 I-Safe• Resetting Your Computer • Cleaning the Scanner Window, Screen, and Computer
Chapter 5— Troubleshooting and Maintenance100 CK32 I-Safe Handheld Computer User’s ManualUpgrading the CK32 I-Safe Using SmartSystemsYou can use the SmartSystems™ Foundation application from Intermec to perform operating system upgrades on your CK32 I-Safe. SmartSystems client is installed on your CK32-I-Safe, which means it is SmartSystems-enabled. The console is part of SmartSystems Foundation, which you can download from www.intermec.com/SmartSystems. When you upgrade the operating system, you erase the current configuration and replace it with the new default configuration. You will need to reset the network parameters on the CK32 I-Safe to reestablish communications with other devices in the network. In other words, if you upgrade the operating system and the default registry from the operating system has changed, the registry is rolled back to the new default.When you upgrade your CK32 I-Safe , you are updating the operating system (OS) and the SmartSystems Platform Bundle (SSPB) files. The SSPB files are stored on the Flash File Store, and deliver Intermec Value Add (IVA) functionality such as data collection, configuration, and wireless security. As new features are added to these components, you can upgrade your SSPB files without needing to upgrade the operating system. Similarly, features added to the operating system do not affect the functionality of the SSPB, and you can choose to upgrade only the operating system. If you choose to update only the operating system, the SSPB will need to be re-installed.If you are upgrading the OS and SSPB files, you first install the OS upgrade and then you install the SSPB upgrade. The installation process is very similar for both type of upgrade but the way the files install is different.Downloading the Upgrade FilesYou need to download the latest upgrade files from the Intermec web site to your desktop computer.To download the upgrade files1Start your web browser and go to the Intermec web site at www.intermec.com.2Go to Service & Support > Downloads.
Chapter 5— Troubleshooting and MaintenanceCK32 I-Safe Handheld Computer User’s Manual 1013Select Computers: CK32 I-Safe Mobile Computer from the list.4Select the download you need. Make sure the download you select is for the CK32 I-Safe computer and that it contains the upgrade you want: operating system only, SSPB only, or operating system and SSPB.5Download the .zip file to your desktop computer.6Use the SmartSystems server to upgrade the CK32 I-Safe. To Upgrade the Operating System1Connect your the CK32 I-Safe to your network that has the SmartSystem Server installed.2Install SmartSystems Foundation on your desktop or laptop computer, then double-click the icon on your toolbar to start the SmartSystems Console.3Double-click the SmartSystems icon on your taskbar to start the SmartSystems Console.Note: You cannot install the files for the OS and the SSPB bundle at the same time. You need to install one and then install the other or install only the bundle that you need to upgrade.
Chapter 5— Troubleshooting and Maintenance102 CK32 I-Safe Handheld Computer User’s ManualThe SmartSystem Console screen has three sections:• Keypad Computers (devices you are using)• SmartSystem Applications (used to upgrade)• Software Vault (where your upgrades are stored)4Click the Discover icon on the SmartSystems Console. Your CK32 I-Safe should appear in the Keypad Computers area of the screen.5Click and drag the OS bundle from the Software Vault and drag to the C32 I-Safe icon. Release the OS bundle on the device icon and the following message will appear.6Click the Yes button and SmartSystems Server will start transferring files to the CK32 I-Safe. A white screen with text on it will appear on the CK32 I-Safe icon as the files are being downloaded.When the file download is complete, the CK32 I-Safe performs a warm boot and starts to install the upgrade files. After the OS file installation is completed, the CK32 I-Safe warm boots again and the Windows Mobile welcome screen appears. You will need to recalibrate the screen at this time.To upgrade the SSPB1Connect your the CK32 I-Safe to your network that has the SmartSystem Server installed.2Install SmartSystems Foundation on your desktop or laptop computer, then double-click the icon on your toolbar to start the SmartSystems Console.Make sure that the CK32 I-Safe does not suspend during the download or errors could occur.
Chapter 5— Troubleshooting and MaintenanceCK32 I-Safe Handheld Computer User’s Manual 1033Double-click the SmartSystems icon on your taskbar to start the SmartSystems Console.4Click the Discover icon on the SmartSystems Console. Your CK32 I-Safe should appear in the Keypad Computers area of the screen.5Click and drag the SSPB bundle from the Software Vault and drag to the C32 I-Safe icon. Release the SSPB bundle on the device icon.6Click the Yes button when the SmartSystem message appears. The SmartSystems Server will start transferring files to the CK32 I-Safe. A white screen with text on it will appear on the CK32 I-Safe icon as the files are being downloaded.When the file download is complete, the CK32 I-Safe performs a warm boot and starts to install the upgrade files. When the Today screen appears, SSPB file installation begins. After all files are installed, you will need to reconnect the CK32 I-Safe to your network.Contacting Product SupportIf you cannot find the answer to your problem in the “Troubleshooting the CK32 I-Safe” section, you can visit the Intermec technical knowledge base (Knowledgebase Central) at intermec.custhelp.com to review technical information or to request technical support.To talk to an Intermec Product Support representative, call 1-800-755-5505.Before you call Intermec Product Support, make sure you have the following information ready:• Operating system version• Configuration number• If you are using security, know the type (Funk or Microsoft) and the full set of parametersMake sure that the CK32 I-Safe does not suspend during the download or errors could occur.
Chapter 5— Troubleshooting and Maintenance104 CK32 I-Safe Handheld Computer User’s Manual• Power management settings• If you are using terminal emulation (TE), know the version and protocol• If you are not using TE, know the language your custom application was written in and the tools you used to create itYou can find most of the information listed above in Intermec Diagnostics or Intermec Settings. Consult your application developer for information on your custom application.To find your operating system version•Tap Start > Internet Explorer > Intermec. An Intermec page opens and displays the Windows Mobile version loaded on your CK32 I-Safe.To find your configuration number• Look at the label on the back of the CK32 I-Safe.To open Intermec Settings•Tap Start > Settings > System > Intermec Settings.Troubleshooting the CK32 I-SafeIf you send the CK32 I-Safe in for service, it is your responsibility to save the computer data and configuration. Intermec is responsible only for ensuring that the keypad and other hardware features match the original configuration when repairing or replacing your computer.Problems While Operating the CK32 I-SafeIf you have trouble operating the CK32 I-Safe, check these problems and possible solutions.
Chapter 5— Troubleshooting and MaintenanceCK32 I-Safe Handheld Computer User’s Manual 105Problems While Operating the CK32 I-SafeProblem SolutionsYou press the Power button to turn on the CK32 I-Safe and nothing happens.Make sure the backlight is on by pressing E. Make sure you have a charged battery installed correctly. For help, see “Charging and Installing the Battery” on page 5. The battery may be discharged. Replace the battery with a spare charged battery, or charge the battery and try again. The Battery light is blinking. The battery is running low. Replace the battery with a spare charged battery, or charge the battery.You use your stylus to tap the screen and nothing happens.Recalibrate your touch screen. For help, see “Using the Touch Screen” on page 14.The blue Ready-to-Work indicator is off.Try these possible solutions:The Ready-to-Work application (such as TE 2000) has not loaded successfully. For help, see the documentation or online help for the application.The CK32 I-Safe is not running a Ready-to-Work application.The blue Ready-to-Work indicator is blinking.The Ready-to-Work application (such as TE 2000) may be running, but is not connected to a host. Verify that the application is properly configured to communicate with the host.The blue Ready-to-Work indicator is on. A connection has been established, and all network connections are active. There is nothing to troubleshoot.
Chapter 5— Troubleshooting and Maintenance106 CK32 I-Safe Handheld Computer User’s ManualProblems While Configuring SecurityIf you have trouble configuring the computer for security, check these problems and possible solutions.Problems While Configuring SecurityProblem SolutionYou are using static WEP keys and you have a strong connection to the access point, but you cannot communicate with it.Make sure that you are using the correct static WEP key. You are setting up multiple access points in a network, with different SSIDs, and the connection fails.The CK32 I-Safe does not save WEP key values when you change the SSID. Re-enter the WEP key value after you change the SSID and save your changes. You should now be able to connect to the different access points.You receive a message saying “The server certificate has expired or your system date is incorrect” after you cold boot the CK32 I-Safe.The correct date and time on the CK32 I-Safe are not always saved through a cold boot. You need to re-enter the date and time, and then save your changes.The CK32 I-Safe indicates that it is not authenticatedMake sure that:• the User Name and Password on your CK32 I-Safe match the user name and password on your authentication server. You may need to reenter the password on both your CK32 I-Safe and authentication server. • on your authentication server, the user and group are allowed and the group policy is allowed to log in to the server. For help, see the documentation that shipped with your authentication server software. • the IP address and secret key for your access point must match the IP address and secret key on your authentication server. You may need to re-enter the IP address and secret key on both your access point and authentication server.
Chapter 5— Troubleshooting and MaintenanceCK32 I-Safe Handheld Computer User’s Manual 107Problems with Wireless ConnectivityIf you have trouble with wireless connectivity, check these problems and possible solutions.Problems With Wireless ConnectivityProblem SolutionWhen you turn on the CK32 I-Safe after it was suspended for 10-15 minutes or longer, it can no longer send or receive messages over the network.The host may have deactivated or lost your current terminal emulation session. In a TCP/IP direct connect network, you need to turn off the “Keep Alive” message (if possible) from the host so that the TCP session is maintained while a CK32 I-Safe is suspended.The network connection icon is in the status bar, but the host computer is not receiving any data from the CK32 I-Safe. In a UDP Plus network, there may be a problem with the connection between the Intermec Application Server and the host computer. Check with your network administrator or see the user’s manual for the Intermec Application Server. In a TCP/IP network, there may be a problem with the connection between the access point and the host computer. Check with your network administrator or use your access point user’s manual.The no network connection icon (  )appears on the status bar. • The CK32 I-Safe is not connected to the access point. Make sure the access point is turned on and operating. You may also be using the CK32 I-Safe out of range of an access point. Try moving closer to an access point to re-establish communications. • Make sure the CK32 I-Safe is configured correctly for your network. The radio parameters on the CK32 I-Safe must match the values set for all access points the CK32 I-Safe may communicate with. For help, see “Setting Up 802.11 Radio Communications” on page 45. • If you have an 802.11b radio, the radio initialization process may have failed. Try resetting the CK32 I-Safe. See “Resetting Your Computer” on page 110.• If you have tried these possible solutions and the no network connection icon still appears, you may have a defective radio card. For help, contact your local Intermec service representative.
Chapter 5— Troubleshooting and Maintenance108 CK32 I-Safe Handheld Computer User’s ManualProblems With Wireless Connectivity (continued)Problem SolutionThe CK32 I-Safe is connected to the Intermec Application Server or host computer and you move to a new site to collect data. The network connection icon was visible but now the no network connection icon (  ) is visible. You may have gone out of range of an access point. Try moving closer to an access point or to a different location to re-establish communications. Once you are in range again, the network connection icon appears again. Any data you collected while out of range is transmitted over the networkWhile configuring or using wireless printing, you see the message, “The Bluetooth COM port does not exist [55]. This is probably because the computer was just resumed. Please wait a few seconds and try again.”If you recently resumed the CK32 I-Safe, wait a few seconds and try again.Otherwise, you need to make sure that the device you selected as the current wireless printer is a printer, is turned on, and is discoverable.To learn about the current wireless printer and the Bluetooth COM port, see ““Creating an Application That Lets You Print Wirelessly” on page 41.While configuring or using wireless printing, you see the message, “Bluetooth is off. Would you like to turn it on and continue?”Tap  Yes to dismiss the message. Follow the instructions in “Setting Up Bluetooth Communications” on page 39 to turn on the power to the Bluetooth radio.
Chapter 5— Troubleshooting and MaintenanceCK32 I-Safe Handheld Computer User’s Manual 109Problems While Scanning Bar Codes Problem SolutionYou cannot see a red beam of light from the scanner when you press the Scan button and aim the scanner at a bar code label.You may be too far from the bar code label. Move closer to the bar code label and try again.You may be scanning the bar code label “straight on.” Change the scanning angle and try again. You can test the effective range of the scanner. Move within 61 cm (2 feet) of a wall and try again. You must be within the scanning range to scan bar code labels. For help, see “Scanning Bar Codes” on page 18.When you release the Scan button or handle trigger, the red beam of light from the scanner does not turn off.Press the Scan button or pull the trigger again without scanning a bar code label. If the red beam is still on, contact your local Intermec service representative.The scanner does not read the bar code labels quickly, or the scanning beam seems to be faint or obscured.The scanner window may be dirty. Clean the window with a solution of ammonia and water. Wipe dry. Do not allow abrasive material to touch the window.You scan a valid bar code label to enter data for your application. The data decoded by the scan module does not match the data encoded in the bar code label. Try these possible solutions in order:The computer may have decoded the bar code label in a symbology other than the label’s actual symbology. Try scanning the bar code label again. Make sure you scan the entire label. To operate the computer quickly and efficiently, you should enable only the bar code symbologies that you are going to scan.
Chapter 5— Troubleshooting and Maintenance110 CK32 I-Safe Handheld Computer User’s ManualResetting Your ComputerYou may need to reset your computer if:• the CK32 I-Safe completely stops responding• an application is locked up and stops responding• when you upgrade the firmware• when you reflash the CK32 I-SafePreferred Reset MethodThis procedure is the recommended method in recovering the CK32 I-Safe. It performs a graceful system shutdown and no data is lost in the process.To recover the CK32 I-Safe•Press and hold the Power button for about 10 seconds.Secondary Reset MethodIf performing the preferred reset method does not restore system operation, try using the secondary reset method. This method does not guarantee that cached disk data will be saved, and as such, transactional data may be lost during the reset. All other data is preserved.To press the reset switch1Press the Power button to suspend the CK32 I-Safe.2With a bent paper clip or similar device, press the recessed reset switch on the CK32 I-Safe keypad.Reset Switch
Chapter 5— Troubleshooting and MaintenanceCK32 I-Safe Handheld Computer User’s Manual 111Performing a Clean BootIf performing either reset method fails to restore system operation, you may have to perform a clean boot. This is a boot method which formats the Object Store (user store) to clean data and registry information from the CK32 I-Safe system and restore them to their factory-default state. To perform a clean boot1Press the Power button to suspend the CK32 I-Safe.2With a bent paper clip or similar device, press the recessed reset switch on the CK32 I-Safe keypad.3Press and hold the Power button until a Warning message appears on the display, release the Power button, then read the message.4Press and release the right side of the Scan button to perform a clean boot. Press and release the left side of the Scan button to cancel the clean boot.Cleaning the Scanner Window, Screen, and ComputerTo keep the computer in good working order, you may need to perform these minor maintenance tasks:• clean the scanner window• clean the screen• clean the computer housing and handleThe clean boot process will erase the memory in the CK32 I-Safe, including all applications and data files found in the object store. To preserve application programs through a clean boot they must be stored in the Flash File Store.
Chapter 5— Troubleshooting and Maintenance112 CK32 I-Safe Handheld Computer User’s ManualCleaning the Scanner Window and ScreenClean the scanner window and screen as often as needed for the environment in which you are using the computer. To clean the window and screen, use a solution of ammonia and water. Mixing of ammonia and water should be done in a well ventilated area.To clean the scanner window and computer screen1Press the Power button to turn off the CK32 I-Safe.2Dip a clean towel or rag in the ammonia solution and wring out the excess. Wipe off the scanner window and screen. Do not allow any abrasive material to touch these surfaces.3Wipe dry.Cleaning the Handle and ComputerThe exterior of the computer and the handle should be cleaned with a mild solution of soap and water. Other cleaners may affect the ESD dissipation characteristics of the handle and CK32 I-Safe body.Mild soap refers to soaps you use on your hands and/or body that don't contain any abrasive media or filler. The soap should not contain a large amount of artificial fragrance or any of the following: witch hazel, aloe vera, vegetable and herbal oils such as evening primrose oil, olive oil, or coconut oil, or chamomile, lavender, rosemary or peppermint. Do not use products labeled as detergents. Examples of mild soaps are:• Ivory Snow liquid or powder •Ivory bar soap • Jergens mild soap (bar) • Woolite (an exception to hand/body soaps) There are no user-serviceable parts inside the CK32 I-Safe or in the battery. Opening the unit outside of an Intermec approved service facility will void the I-Safe certification.
Chapter 5— Troubleshooting and MaintenanceCK32 I-Safe Handheld Computer User’s Manual 113Add just enough soap to a quantity of water to start and create sudsing (using agitation while adding), but no more; you can't go wrong with this solution. Keep in mind that the water should just be warm; hot water can have adverse affects on some plastics. • Ammonia is not compatible with polycarbonates, a major component in the CK32 I-Safe housing; it is NOT recommended as a cleaner. • Plastic cleaners like 3M Plastic Cleaner, Plexus®, Meguiar’s® PlastX, All Kleer Plastic Cleaner & Polish and the like all have polishes (micro-abrasives) and waxes that make them unsuitable for cleaning the handle and computer.• Plastic protectants like Armor All® or Son of a Gun® are for protecting plastic from UV rays. They clean to some degree, but can leave the product slippery. Use at your own risk.To clean the handle and computer1Unscrew the handle and remove it from the CK32 I-Safe. 2Clean the surface of the magnet with a damp cloth.3Use adhesive tape to remove any metal debris from the surface of the magnet in the handle.4Clean the computer and handle.5Reattach the handle.
Chapter 5— Troubleshooting and Maintenance114 CK32 I-Safe Handheld Computer User’s Manual
CK32 I-Safe Handheld Computer User’s Manual 115ASpecifications
Appendix A — Specifications116 CK32 I-Safe Handheld Computer User’s ManualPhysical and Environmental SpecificationsUse this section to locate technical information about the CK32 I-Safe and its available features and options. Physical DimensionsLength: 24.6 cm (9.41 in)Width: 8.89 cm (3.5 in)Thickness: 7.62 cm (3.0 in)WeightCK32 I-Safe Weight (without battery): 893.59 g (31.52 oz)Battery weight: 194.48 g (6.86 oz)Handle weight: 132.96 g (4.69 oz)Power SpecificationsOperating: Rechargeable 2400 mA lithium-ion batteryBackup: Super capacitor supplies 10 minutes bridge time while replacing the main batteryElectrical SpecificationsElectrical rating: x 7.4 to 12; 500 mA peakTemperature and Humidity SpecificationsOperating temperature: -20°C to 50°C (-4°F to 122°F)Operating humidity: 5 to 90% non-condensingStorage temperature: -20°C to 60°C with battery 70°C without(-4°F to 140°F with battery 158°F without)Storage humidity: 0 to 95% relative humidity, non-condensingLCD Touch Screen Specifications• 240 x 320 QVGA• 8.89 cm (3.5 in) diagonal square active area• LED backlight with high and low settings• No ambient light sensor
Chapter A — SpecificationsCK32 I-Safe Handheld Computer User’s Manual 117Keypad Options• 42-key large numeric and function keypad, available with programmable, 3270 TE/5250 TE, and VT/ANSI TE overlays• 56-key full alphanumeric keypad, available with programmable, 3270 TE/5250 TE, and VT/ANSI TE overlaysBar Code SymbologiesThe CK32 I-Safe supports these bar code symbologies:• Codabar Micro PDF417• Codablock A MSI• Codablock F PDF417•Code 11 Plessey• Code 2 of 5 RSS 14•Code 39 RSS Limited•Code 93 RSS Expanded•Code 128 Telepe n• EAN.UCC Composite TLC 39• Interleaved 2 of 5 UPC/EAN•Matrix 2 of 5
Appendix A — Specifications118 CK32 I-Safe Handheld Computer User’s ManualLinear Imager Reading DistancesMinimum reading distances are measured in the dark (0 lux).Minimum Reading Distances With 0.655 cm (0.258 in) SetbackSymbologyBar Code Contents DensityMinimum DistanceMaximum DistanceCode 39 RESO 0.100 MM 0.1 mm(4 mils)10.27 cm(4.04 in)13.31 cm(5.24 in)R 0.125 MM 0.125 mm(5 mils)9.25 cm(3.64 in)16.36 cm(6.44 in)0.25 0.25 mm(10 mils)5.44 cm(2.14 in)23.22 cm(9.14 in)0.5 0.5 mm(20 mils)3.41 cm(1.34 in)30.33 cm(11.94 in)R1MM 1 mm(40 mils)6.96 cm(2.74 in)39.22 cm(15.44 in)UPC/EAN 120010010100 0.33 mm(13 mils)4.42 cm(1.74 in)25.25 cm(9.94 in)PDF417 10 mils 0.254 mm(10 mils)9.25 cm(3.64 in)16.10 cm(6.34 in)15 mils 0.381 mm(15 mils)7.22 cm(2.84 in)18.39 cm(7.24 in)
Chapter A — SpecificationsCK32 I-Safe Handheld Computer User’s Manual 119Linear Imager Minimum Reading Distances: This graphic does not include the 0.665 cm (0.258 in) setback for the CK32 I-Safe.8"4"6"2"0"2"4"in045403530252015105500" 18"16"14"12"10"8"6"4"2" 20"100% contrast UPC/EAN0.5 mm/20 mil1 mm/40 mil6"8"10"10"0.25 mm/10 mil0.125 mm/5 milcm1050510152020152525
Appendix A — Specifications120 CK32 I-Safe Handheld Computer User’s ManualMinimum Reading Distances With 1.087 cm (0.428 in) SetbackTyping Characters Not Printed on the Keypads hidden key sequences to access characters not printed on the keypad overlay. Use the following table to understand how to access these hidden characters on the keypads.Typing Hidden Characters on the KeypadSymbology Density Minimum Distance Maximum DistanceCode 39 0.125 mm (5 mils) 8.564 cm (3.272 in) 17.962 cm (7.072 in)0.25 mm (10 mils) 5.770 cm (2.272 in) 37.774 cm (14.872 in)0.5 mm (20 mils) 7.802 cm (3.072 in) 78.922 cm (31.072 in)1 mm (40 mils) 8.818 cm (3.472 in) 130.992 cm (51.572 in)1.3 mm (51 mils) Depends on the symbology length and scan angle148.772 cm (58.572 in)UPC/EAN 0.33 mm (13 mils) 5.516 cm (2.172 in) 46.918 cm (18.472 in)To Type:Press This Key Sequence on One of the Keypads:42-Key 56-Key$ Not hidden C and then 6`C and then F9 C and then G! Not hidden C and then I“C and then F6 C and then K'C and then F7 C and then L{C and then F11 C and then N}C and then F12 C and then O:C and then F3 C and then P;C and then F4 C and then Q|C and then F8 C and then R? Not hidden C and then S~C and then F10 C and then TYC and then Alpha Not hidden,C and then Right Enter Not hidden
Chapter A — SpecificationsCK32 I-Safe Handheld Computer User’s Manual 121Typing Hidden Characters on the International KeypadsTyping Hidden Characters on the 3270/5250 TE KeypadsTo Type:Press This Key Sequence on One of the Keypads:42-Key 56-Key$ Not hidden C and then 6{B and then aC and then 9}B and then bC and then 0<B and then _Not hidden>B and then `Not hidden]C and then 9Not hidden[C and then Tab Not hidden,C and then Right EnterNot hiddenTo Type:Press This Key Sequence on One of the Keypads:42-Key 56-Key$ Not hidden C and then 6<B and then _Not hidden>B and then `Not hidden]C and then Alpha Not hidden[C and then Tab Not hidden`Not applicable C and then G! Not hidden C and then I“Not applicable C and then K‘ Not applicable C and then L{B and then aC and then N}B and then bC key and then O:Not applicable C and then P; Not applicable C and then Q?Not hidden C and then R~ Not applicable C and then T,C and then Right Enter Not hidden
Appendix A — Specifications122 CK32 I-Safe Handheld Computer User’s ManualTyping Hidden Characters on the VT/ANSI TE KeypadsAccessoriesYou can use these accessories (sold and ordered separately) with the CK32 I-Safe. To order accessories, contact your local Intermec sales representative.AN1 Communications Adapter (P/N 871-223-xxx)An external adapter used to connect the CK32 I-Safe with wired networks.AC11 Quad Battery Charger (P/N 852-914-xxx)Four battery charger. Charge rate is limited by I-Safe requirements.Handle (P/N 714-625-xxx)The handle provides a convenient scanning trigger.Hand Strap (P/N 825-183-xxx)I-Safe leather hand strap To Type:Press This Key Sequence on One of the Keypads:42-Key 56-Key$ Not hidden C and then 6`Not applicable C and then G! Not hidden C and then I«  Not applicable C and then K‘ Not applicable C and then L{B and then cC and then N}B and then dC key and then O:Not applicable C and then P?C and then 5C and then R]C and then Alpha Not hidden[C and then Tab Not hidden<B and then _Not hidden>B and then `Not hidden,C and then Right Enter Not hiddenNote: You must use the AN1 Communtications Adapter for all wired connections to the CK32 I-Safe.
Chapter A — SpecificationsCK32 I-Safe Handheld Computer User’s Manual 123Carrying Strap Kit (P/N 825-186-xxx)I-Safe leather carrying strapAB6 Battery Pack (P/N 318-021-xxx)Battery packTethered Stylus (P/N 203-828-xxx)Use the tethered stylus to make sure that you never lose your stylus.Battery Eliminator (P/N 714-619-xxx)The battery eliminator provides AC power to your CK32 I-Safe handheld computer.Power Supply (P/N 851-061-xxx)Power supply for the Communications Adapter and Quad Battery Charger.Screen Protector (P/N 346-065-004)Clear covering designed to protect the CK32 I-Safe screen.
Appendix A — Specifications124 CK32 I-Safe Handheld Computer User’s Manual
CK32 I-Safe Handheld Computer User’s Manual 125IIndex
Index126 CK32 I-Safe Handheld Computer User’s ManualNumerics3270/5250 TE keypads, typing hidden characters, 121802.11network protocols, 45802.11 radio communicationschecking status, 47configuring for UDP Plus network, 47configuring network parameters, 46ISpyWiFi status, 48setting up, 45AActiveSyncfunctions, 32installing, 32starting, 33ActiveSynchusing, 32Advanced Encryption Standard (AES), 58AES data encryption, 58applicationinstallingusing SmartSystems Console, 100audiofeedback, understanding, 16system, explained, 16authenticationserver, defined, 58Bbar code symbologiesenabling or disabling, 19bar code symbologies, enabled, 18bar code, test scan, 20bar codes, scanning, 18batterycharging and installing, 5disposal, 4explosion hazard, 5maxiimizing life, 6message, low battery, 7power settings, 6status, 6using, 4warnings, low battery, 7beeper volume, 16Bluetooth audioheadset, 45Bluetooth audio deviceconnecting, 45Bluetooth communicationradio, turning on, 40range, 39settings, 41wireless printing, 41Ccertificatesissued bythird party certificate authority, 77loadingmultiple certificates, 78with Import Certificates, 77CJ32SmartSystems Foundation, configuring with, 37CK32802.11 securtity, 59accessories, 122battery, 4certificate, loading, 76cleaning, 111configuring security, 56developing applications, 82disabling security, 79features, 3Funk and Microsoft Security, chosing between, 60hidden characters, typing, 120LEAP security, 59linear imager reading distances, 118Microsoft security, new connection, 75operating paramters, configuring, 36problems configuring security, 106problems scanning bar codes, 109problems while operating, 104resetting, 110security types, 56troubleshooting, 104wireless connectivity, 107WPA security, 57cleaninghandle and computer, 112
IndexCK32 I-Safe Handheld Computer User’s Manual 127scanner windown and screen, 112color-coded keys, using, 10, 11configuringLEAP security, 63WEP securitywith Funk security, 64with Microsoft security, 75WPA security with Microsoft security, 75WPA-PSK securitywith Microsoft security, 76with Profile Wizard, 67Ddeveloping applicationsAutoCab, 97AutoCopy, 95AutoExec, 91AutoReg, 96AutoRun, 93installing applications, 84Intermec Developer Library, using, 82launching automatically, 90RunAutoRun, 90Trakker Antares, converting from, 83web-based, 83drag-and-drop, using SmartSystems Console, 100EEAP, defined, 58EAP-FAST securityconfiguring with Profile Wizard, 72Enterprise mode, defined, 58Ethernet communicationstatus, checking, 39Ethernet communicationssetting up, 37Etnernet communciationsIntermec Settings, using, 38Extensible Authentication Protocol (EAP), defined, 58FFunk securitiyIntermec Settings, configuring with, 60Funk Securityfeatures, 60Funk securityconfiguringLEAP security, 63WEP, 64profile wizard, 65select profile, 60, 65WPA security, configuring, 61Ggreen key, using, 11IIConnectEthernet, configuring, 39Import Certificates, 77Import Root Certificates, 78Import User Certificates, 78installingapplicationsusing SmartSystems Console, 100Installing applicationsActiveSynch, 85installing applicationsSmartSystems Foundation, 85Wavelink Avalanche, 87Intermec Developer Library (IDL)required hardware, 82required software, 82Intermec Product Supportcontacting, 103operating system version, 104product information, required, 103Intermec Settingsnavigating, 37starting, 36using, 36ISpyWiFigraph function, 55ISpyWiFi tab contents, 50list function, 55Ping tab contents, 54place in Programs group, 48startinc from iConnect, 49supplicant logging, 55Supplicant tab contents, 52WiFi scan tab contents, 51
Index128 CK32 I-Safe Handheld Computer User’s ManualKkeypad42-key illustrated, 956-key illustrated, 10terminal emulation, 8using, 8using color-coded keys, 11LLEAP securityconfiguring, 63configuring with Profile Wizard, 71required equipment, 59Load certificateactive directory, using, 76third-party CA, 77MmanualsData Collection Browser Client User’s Guide, 3iBrowse User’s Guide, 3TE2000 Terminal Emulation Programmer’s Guide, 3Microsoft securityconfiguring, 73configuring WEP, 75configuring WPA, 75configuring WPA-PSK, 76Minimum, 120Oorange key, using, 11Ppassphrasesetting with Profile Wizard, 67PEAP securityconfiguring with Profile Wizard, 68power key, using, 11Pre-Shared Key mode, defined, 58Profile Wizardusing to configure WPA-PSK security, 67Profile wizardWEP security, configuring, 66programsadding or removing, 32PSK mode, defined, 58Rresetting CK32clean boot, 111preferred method, 110secondary method, 110SsecurityconfiguringLEAP, 63WEP, 64WEP securitywith Microsoft,75WPA security with Microsoft, 75WPA-PSK securitywith Microsoft,76with Profile Wizard,67WEP overview, 58SmartSystems Consoleusing to install applications, 100SmartSystems Foundationserver and console, 37specificationsbar code symbologies, supported, 117electrical specifications, 116keypad options, 117LCD, 116physical dimensions, 116power specifications, 116temperature and humidity, 116weight, 116Start screen, 14status lights, explained, 12stylus, using, 15System software updates, 100Ttaskbarillustrated, 14TCP/IPwireless communication, 46TCP/IP Networkconfiguring parameters, 46terminal emulation, typing hidden characters, 121
IndexCK32 I-Safe Handheld Computer User’s Manual 129third party certificate authority, using to issue certificates, 77TLS securityconfiguring with Profile Wizard, 69touch screenaligning, 15touch screen, using, 14troubleshootingwireless connectivity, 107TTLS securityconfiguring with Profile Wizard, 70UUDP Plus networkwireless communications, 47Updating the system software, 100upgradingdownloading files, 100operating system, 101SSPB, 102Upgrading the operating system, 100usinggreen key, 11orange key, 11Vverify scanner operation, 19volumebeeper volume, disable, 17WWEP securityconfiguringwith Funk security, 64with Microsoft security, 75overview, 58Windos Mobileintroduction, 24Windows Mobileaccessing programs, 26block recognizer, using, 29command bar, 26companion programs, 24entering information, 27File Exporer, using, 30Internet Explorer, using, 34keyboard,typing, 28navigation bar, 26pop-up menus, 27screen, writing on, 30settings, adjusting, 30support, 25text, typing, 30touch screen, 25transcriber, using, 29wireless communicationstroubleshooting, 107wireless printerdevice address, entering, 44wireless printingapplet, 42choosing printer, 44discover printer, 43from application, 41select printer, 42WPA securityconfiguringwith Microsoft security, 75WPA2 securityoverview, 58WPA2-PSK securityconfiguring with Funk security, 62configuring with Profile Wizard, 67WPA-PSK securityconfiguringwith Microsoft security, 76configuring with Funk security, 62configuring with Profile Wizard, 67
Index130 CK32 I-Safe Handheld Computer User’s Manual
Worldwide Headquarters6001 36th Avenue WestEverett, Washington 98203U.S.A.tel  425.348.2600fax  425.355.9551www.intermec.comCK32 I-Safe Handheld Computer User’s Manual*935-006-001*P/N 935-006-001

Navigation menu