EasyManuals Logo

Zebra TC52 Integrator Guide

Zebra TC52
192 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #120 background imageLoading...
Page #120 background image
Settings
120
9. If the network security is 802.1x EAP:
Touch the EAP method drop-down list and select PEAP, TLS, TTLS, PWD or LEAP.
Touch the Phase 2 authentication drop-down list and select an authentication method.
If required, touch CA certificate and select a Certification Authority (CA) certificate. Note: Certificates
are installed using the Security settings.
If required, touch User certificate and select a user certificate. Note: User certificates are installed
using the Security settings.
If required, in the Identity text box, enter the username credentials.
If desired, in the Anonymous identity text box, enter an anonymous identity username.
If required, in the Password text box, enter the password for the given identity.
NOTE: By default, the network Proxy is set to None and the IP settings is set to DHCP. See Configuring for a Proxy
Server on page 120
for setting connection to a proxy server and see Configuring the Device to Use a Static IP Ad-
dress on page 121
for setting the device to use a static IP address.
10.Touch Save. To connect to the saved network, touch and hold on the saved network and select Connect to
network.
11.Touch .
Configuring for a Proxy Server
A proxy server is a server that acts as an intermediary for requests from clients seeking resources from other
servers. A client connects to the proxy server and requests some service, such as a file, connection, web
page, or other resource, available from a different server. The proxy server evaluates the request according to
its filtering rules. For example, it may filter traffic by IP address or protocol. If the request is validated by the
filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf
of the client.
It is important for enterprise customers to be able to set up secure computing environments within their
companies, making proxy configuration essential. Proxy configuration acts as a security barrier ensuring that
the proxy server monitors all traffic between the Internet and the intranet. This is normally an integral part of
security enforcement in corporate firewalls within intranets.
To configure the device for a proxy server:
1. In the network dialog box, touch a network.
2. Touch Advanced options.

Table of Contents

Other manuals for Zebra TC52

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Zebra TC52 and is the answer not in the manual?

Zebra TC52 Specifications

General IconGeneral
RFID reader-
Scanner type2D
Product colorBlack
Phone functionYes
Display diagonal5 \
Touch technologyDual-touch
Touchscreen typeCapacitive
Display resolution1280 x 720 pixels
USB 2.0 ports quantity1
Flash memory32 GB
Internal memory4 GB
Compatible memory cardsMicroSD (TransFlash)
Maximum memory card size256 GB
Storage temperature (T-T)-40 - 70 °C
Operating temperature (T-T)-20 - 50 °C
Operating relative humidity (H-H)5 - 95 %
Battery capacity4150 mAh
Number of cores8
Processor model660
Processor familySnapdragon
Processor frequency2.2 GHz
Processor manufacturerQualcomm
GPS (satellite)No
Operating system installedAndroid
Bluetooth version5.0
Rear camera aperture number2.2
Front camera aperture number2
Rear camera resolution (numeric)13 MP
Front camera resolution (numeric)5 MP
Weight and Dimensions IconWeight and Dimensions
Depth18.6 mm
Width75.5 mm
Height155 mm
Weight249 g

Related product manuals