Brother International HL-2170W Network Users Manual - English - Page 23

Authentication and encryption - wireless printer

Page 23 highlights

Configuring the wireless network settings (For HL-2170W) „ Channels Wireless networks use channels. Each wireless channel is on a different frequency. There are up to 14 different channels that can be used when using a wireless network. However, in many countries the number of channels available are restricted. For further information, see Ethernet wireless network on page 127. Authentication and encryption 3 3 Most wireless networks use some kind of security settings. These security settings define the authentication (how the device identifies itself to the network) and encryption (how the data is encrypted as it is sent on the network). If you do not correctly specify these options when you are configuring your Brother wireless device, it will not be able to connect to the wireless network. Therefore care must be taken when configuring these options. Please refer to the information below to see which authentication and encryption methods your Brother wireless device supports. „ Authentication methods The Brother printer supports the following methods: • Open system Wireless devices are allowed access the network without any authentication. • Shared key A secret pre-determined key is shared by all devices that will access the wireless network. The Brother printer uses the WEP keys as the pre-determined key. • WPA-PSK/WPA2-PSK Enables a Wi-Fi® Protected Access Pre-shared key (WPA-PSK/WPA2-PSK), which enables the Brother wireless printer to associate with access points using TKIP for WPA-PSK or AES for WPA-PSK and WPA2-PSK (WPA-Personal). • LEAP Cisco®LEAP (Light Extensible Authentication Protocol) has been developed by Cisco Systems, Inc. which uses user ID and password for authentication. „ Encryption methods Encryption is used to secure the data that is sent over the wireless network. The Brother printer supports the following encryption methods: • None No encryption method is used. • WEP By using WEP (Wired Equivalent Privacy), the data is transmitted and received with a secure key. • TKIP TKIP (Temporal Key Integrity Protocol) provides per-packet key mixing a message integrity check and rekeying mechanism. • AES AES (Advanced Encryption Standard) is Wi-Fi® authorized strong encryption standard. 16

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137

Configuring the wireless network settings (For HL-2170W)
16
3
Channels
Wireless networks use channels. Each wireless channel is on a different frequency. There are up to 14
different channels that can be used when using a wireless network. However, in many countries the
number of channels available are restricted. For further information, see
Ethernet wireless network
on page 127.
Authentication and encryption
3
Most wireless networks use some kind of security settings. These security settings define the authentication
(how the device identifies itself to the network) and encryption (how the data is encrypted as it is sent on the
network). If you do not correctly specify these options when you are configuring your Brother wireless device,
it will not be able to connect to the wireless network. Therefore care must be taken when configuring these
options. Please refer to the information below to see which authentication and encryption methods your
Brother wireless device supports.
Authentication methods
The Brother printer supports the following methods:
Open system
Wireless devices are allowed access the network without any authentication.
Shared key
A secret pre-determined key is shared by all devices that will access the wireless network.
The Brother printer uses the WEP keys as the pre-determined key.
• WPA-PSK/WPA2-PSK
Enables a Wi-Fi
®
Protected Access Pre-shared key (WPA-PSK/WPA2-PSK), which enables the
Brother wireless printer to associate with access points using TKIP for WPA-PSK or AES for WPA-PSK
and WPA2-PSK (WPA-Personal).
• LEAP
Cisco
®
LEAP (Light Extensible Authentication Protocol) has been developed by Cisco Systems, Inc.
which uses user ID and password for authentication.
Encryption methods
Encryption is used to secure the data that is sent over the wireless network. The Brother printer supports
the following encryption methods:
• None
No encryption method is used.
• WEP
By using WEP (Wired Equivalent Privacy), the data is transmitted and received with a secure key.
• TKIP
TKIP (Temporal Key Integrity Protocol) provides per-packet key mixing a message integrity check and
rekeying mechanism.
• AES
AES (Advanced Encryption Standard) is Wi-Fi
®
authorized strong encryption standard.