EasyManuals Logo

Zebra TC52 Series User Manual

Zebra TC52 Series
198 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #88 background imageLoading...
Page #88 background image
Wireless
88
PWD
LEAP.
Touch the Phase 2 authentication drop-down list and select an authentication method.
If required, touch CA certificate and select a Certification Authority (CA) certificate. Note: Certificates
are installed using the Security settings.
If required, touch User certificate and select a user certificate. Note: User certificates are installed
using the Security settings.
If required, in the Identity text box, enter the username credentials.
If desired, in the Anonymous identity text box, enter an anonymous identity username.
If required, in the Password text box, enter the password for the given identity.
NOTE: By default, the network Proxy is set to None and the IP settings is set to DHCP. See Configuring for a
Proxy Server on page 88 for setting connection to a proxy server and see Configuring the Device to Use a
Static IP Address on page 89 for setting the device to use a static IP address.
10.Touch Save. To connect to the saved network, touch and hold on the saved network and select Connect to
network.
11.Touch the Home button.
Configuring for a Proxy Server
A proxy server is a server that acts as an intermediary for requests from clients seeking resources from other
servers. A client connects to the proxy server and requests some service, such as a file, connection, web
page, or other resource, available from a different server. The proxy server evaluates the request according to
its filtering rules. For example, it may filter traffic by IP address or protocol. If the request is validated by the
filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf
of the client.
It is important for enterprise customers to be able to set up secure computing environments within their
companies, making proxy configuration essential. Proxy configuration acts as a security barrier ensuring that
the proxy server monitors all traffic between the Internet and the intranet. This is normally an integral part of
security enforcement in corporate firewalls within intranets.
1. Go to Settings.
2. Touch Network & Internet > Wi-Fi.
3. Slide the Wi-Fi switch to the On position.
4. In the network dialog box, select and touch a network.
5. Touch Advanced options.
6. Touch Proxy and select Manual.
7. In the Proxy hostname text box, enter the address of the proxy server.
8. In the Proxy port text box, enter the port number for the proxy server.
9. In the Bypass proxy for text box, enter addresses for web sites that are not required to go through the
proxy server. Use a comma “,” between addresses. Do not use spaces or carriage returns between
addresses.
10.Touch Connect.
11.Touch the Home button.
MN-003834-01ENa_tc52-android-10-ug-en.book Page 88

Table of Contents

Other manuals for Zebra TC52 Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Zebra TC52 Series and is the answer not in the manual?

Zebra TC52 Series Specifications

General IconGeneral
ProcessorQualcomm Snapdragon 660 octa-core, 2.2 GHz
Memory4 GB RAM/32 GB Flash or 4 GB RAM/64 GB Flash
Front Camera5 MP
Operating Temp-4°F to 122°F/-20°C to 50°C
Operating SystemAndroid
Touch PanelCapacitive touch panel; multi-touch
Rear Camera13 MP with autofocus and flash
BatteryLi-Ion 4150 mAh; Hot-swappable
ConnectivityWi-Fi 802.11 a/b/g/n/ac
Drop SpecificationMultiple 6 ft./1.8 m drops to concrete over operating temperature range
Tumble Specification1000 tumbles at 0.5 m (1.6 ft)
SealingIP65
Expansion SlotMicroSD
ScannerSE4710 imager (1D and 2D barcode scanning)
DurabilityCorning Gorilla Glass
Weight8.8 oz./249 g

Related product manuals