WORKABOUT PRO Hand-Held Computer With Windows Mobile 6 Classic & Professional User Manual A-5
Appendix A: Summit Client Utility (SCU)
SCU Security Capabilities
Data encryption and decryption using WPA2 AES, WPA TKIP or WEP.
Common EAP types include:
EAP-TLS: Uses the same technology as a follow-on to Secure Socket
Layer (SSL). It provides strong security, but relies on client certificates for
user authentication.
PEAP: Provides secure user authentication by using a TLS tunnel to
encrypt EAP traffic. Two different inner methods are used with PEAP:
EAP-MSCHAPV2, resulting in PEAP-MSCHAP: This is appropriate
for use against Windows Active Directory and domains.
EAP-GTC, resulting in PEAP-GTC: This is for authentication with one-
time passwords (OTPs) against OTP databases such as SecureID.
LEAP: Is an authentication method for use with Cisco WLAN access
points. LEAP does not require the use of server or client certificates. LEAP
supports Windows Active Directory and domains but requires the use of
strong passwords to avoid vulnerability to offline dictionary attacks.
EAP-FAST: Is a successor to LEAP and does not require strong passwords
to protect against offline dictionary attacks. Like LEAP, EAP-FAST does
not require the use of server or client certificates and supports Windows
Active Directory and domains.
Note: PEAP and EAP-TLS require the use of Windows facilities for the configu-
ration of digital certificates.

SCU EAP Types

The following EAP types are supported by the integrated supplicant and can be
configured in SCU: PEAP-MSCHAP, PEAP-GTC, LEAP and EAP-FAST. With
each of these four types, if authentication credentials are not stored in the config,
you will be prompted to enter credentials the first time the radio attempts to
associate to an access point that supports 802.1X (EAP).
Consider the following when configuring one of the EAP types:
PEAP-GTC: SCU supports static (login) passwords only.
LEAP: Strong passwords are recommended.
EAP-FAST: SCU supports automatic, not manual, PAC provisioning.