Brother International DCP-8155DN Network User's Guide - English - Page 171

Network key, Authentication and Encryption methods for an enterprise wireless network

Page 171 highlights

Wireless network terms and concepts (For MFC-8710DW, MFC-8910DW and MFC-8950DW(T)) Network key 12  Open system/Shared key with WEP This key is a 64-bit or 128-bit value that must be entered in an ASCII or hexadecimal format. • 64 (40) bit ASCII: Uses 5 text characters. e.g. "WSLAN" (this is case sensitive) • 64 (40) bit hexadecimal: Uses 10 digits of hexadecimal data. e.g. "71f2234aba" • 128 (104) bit ASCII: Uses 13 text characters. e.g. "Wirelesscomms" (this is case sensitive) • 128 (104) bit hexadecimal: Uses 26 digits of hexadecimal data. e.g. "71f2234ab56cd709e5412aa2ba"  WPA-PSK/WPA2-PSK and TKIP or AES Uses a Pre-Shared Key (PSK) that is 8 or more characters in length, up to a maximum of 63 characters. Authentication and Encryption methods for an enterprise wireless network 12 An enterprise wireless network is a large network, for example using your machine in a business enterprise wireless network, with IEEE 802.1x support. If you configure your machine in an IEEE 802.1x supported wireless network, you can use the following authentication and encryption methods. Authentication methods  LEAP For LEAP, see LEAP (For wireless network) uu page 160.  EAP-FAST For EAP-FAST, see EAP-FAST uu page 160.  PEAP For PEAP, see PEAP uu page 160.  EAP-TTLS For EAP-TTLS, see EAP-TTLS uu page 161.  EAP-TLS For EAP-TLS, see EAP-TLS uu page 161. 12 12 164

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187

164
Wireless network terms and concepts (For MFC-8710DW, MFC-8910DW and MFC-8950DW(T))
12
Network key
12
Open system/Shared key with WEP
This key is a 64-bit or 128-bit value that must be entered in an ASCII or hexadecimal format.
64 (40) bit ASCII:
Uses 5 text characters. e.g. “WSLAN” (this is case sensitive)
64 (40) bit hexadecimal:
Uses 10 digits of hexadecimal data. e.g. “71f2234aba”
128 (104) bit ASCII:
Uses 13 text characters. e.g. “Wirelesscomms” (this is case sensitive)
128 (104) bit hexadecimal:
Uses 26 digits of hexadecimal data. e.g. “71f2234ab56cd709e5412aa2ba”
WPA-PSK/WPA2-PSK and TKIP or AES
Uses a Pre-Shared Key (PSK) that is 8 or more characters in length, up to a maximum of 63 characters.
Authentication and Encryption methods for an enterprise wireless network
12
An enterprise wireless network is a large network, for example using your machine in a business enterprise
wireless network, with IEEE 802.1x support. If you configure your machine in an IEEE 802.1x supported
wireless network, you can use the following authentication and encryption methods.
Authentication methods
12
LEAP
For LEAP, see
LEAP (For wireless network)
uu
page 160.
EAP-FAST
For EAP-FAST, see
EAP-FAST
uu
page 160.
PEAP
For PEAP, see
PEAP
uu
page 160.
EAP-TTLS
For EAP-TTLS, see
EAP-TTLS
uu
page 161.
EAP-TLS
For EAP-TLS, see
EAP-TLS
uu
page 161.