Canon PIXMA MP800R Setup Guide - Page 22

Confirming Settings of your Access Point - mac

Page 22 highlights

ENGLISH Confirming Settings of your Access Point When setting up the machine to be used over wireless LAN, the machine's network settings are configured to match those of the access point. Therefore, if you are using wireless LAN, we recommend that you confirm the necessary information on the access point before entering the setup process. Check and fill in the table below. SSID/network name Stealth/closed network*1 ANY-Rejection*2 Radio channel Disabled Disabled Automatic Enabled Enabled Channel ( ) : The machine can communicate in channels 1 to 11. Encryption Disabled WEP Enabled key ( ) WPA or WPA2 Enabled*3 key ( ) Encryption (TKIP · AES) MAC address filtering Disabled Enabled IP address filtering Client-to-Client Blocking*4 Disabled Disabled Enabled Enabled *1 In the stealth mode, an access point hides itself by not broadcasting its SSID. The client must specify the SSID set to the access point to detect it. In Macintosh, the stealth mode is called a "closed network". *2 Any rejection is a feature of an access point to hide itself from and/or reject connection with clients whose SSID/network name is set to "ANY". *3 This machine supports the methods below. If you are using another method, change the WPA/ WPA2 settings on the access point and computers to match these. Authentication method: WPA-PSK (WPA Personal) or WPA2-PSK (WPA2 Personal) Encryption method: TKIP or AES *4 If Client-to-Client Blocking is enabled, clients are not allowed to communicate with other clients associated with the same access point. Note For information on how to confirm the settings of the access point, refer to the manual provided with the access point or contact its manufacturer. z If Stealth (closed network) or ANY-Rejection feature is enabled We recommend you to disable it before entering setup. z If MAC address filtering is enabled You must register the machine's MAC address to the access point before entering setup. To confirm the MAC address of the machine, print the machine's network information. See "Printing Out Network Setting Information" on page 72. Confirming the Setup Environment 21

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78

21
Confirming the Setup Environment
ENGLISH
Confirming Settings of your Access Point
When setting up the machine to be used over wireless LAN, the machine’s network settings are
configured to match those of the access point. Therefore, if you are using wireless LAN, we
recommend that you confirm the necessary information on the access point before entering the
setup process. Check and fill in the table below.
*1
In the stealth mode, an access point hides itself by not broadcasting its SSID. The client must
specify the SSID set to the access point to detect it. In Macintosh, the stealth mode is called a
“closed network”.
*2
Any rejection is a feature of an access point to hide itself from and/or reject connection with clients
whose SSID/network name is set to “ANY”.
*3
This machine supports the methods below. If you are using another method, change the WPA/
WPA2 settings on the access point and computers to match these.
Authentication method: WPA-PSK (WPA Personal) or WPA2-PSK (WPA2 Personal)
Encryption method: TKIP or AES
*4
If Client-to-Client Blocking is enabled, clients are not allowed to communicate with other clients
associated with the same access point.
If Stealth (closed network) or ANY-Rejection feature is enabled
We recommend you to disable it before entering setup.
If MAC address filtering is enabled
You must register the machine’s MAC address to the access point before entering setup. To
confirm the MAC address of the machine, print the machine’s network information. See
“Printing
Out Network Setting Information” on page 72
.
SSID/network name
Stealth/closed network
*1
Disabled
Enabled
ANY-Rejection
*2
Disabled
Enabled
Radio channel
Automatic
Channel
(
)
: The machine can communicate in channels 1 to 11.
Encryption
Disabled
WEP Enabled
key (
)
WPA or WPA2 Enabled
*3
key (
)
Encryption (TKIP · AES)
MAC address filtering
Disabled
Enabled
IP address filtering
Disabled
Enabled
Client-to-Client Blocking
*4
Disabled
Enabled
Note
For information on how to confirm the settings of the access point, refer to the manual provided with the
access point or contact its manufacturer.