Canon PIXMA MX459 User Manual - Page 199

About Technical Terms - user manual

Page 199 highlights

About Technical Terms In this section, technical terms used in the manual are explained. A B C D F I K L M O P R S T U W A • Access Point A wireless transceiver or base station that receives information from wireless clients/the machine and rebroadcasts it. Required in an infrastructure network. • Ad-hoc Client computer and machine setting where wireless communication occurs on a peer-topeer basis, i.e., all clients in with the same SSID/network name communicate directly with each other. No access point is required. This machine does not support ad-hoc communication. • Admin Password Administration password in IJ Network Tool to restrict access to network users. It must be entered to access the printer and change printer settings. When the printer's network settings are factory default, the admin password does not have to been entered. • AES An encryption method. It is optional for WPA. Strong cryptographic algorithm adopted within U.S. government organizations for information processing. • Authentication Method The method that an access point uses to authenticate a printer through a wireless LAN. The methods are agreeable each other. When using WEP as an encryption method, the authentication method is able to fix to Open System or Shared Key. For WPA/WPA2, authentication method is PSK. • Auto The printer automatically changes its authentication method to match the access point. • Open System In this authentication method, the communication partner is authenticated without using WEP key even if Use WEP is selected. • Shared Key

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217

About Technical Terms
In this section, technical terms used in the manual are explained.
A
B
C
D
F
I
K
L
M
O
P
R
S
T
U
W
A
Access Point
A wireless transceiver or base station that receives information from wireless clients/the machine
and rebroadcasts it. Required in an infrastructure network.
Ad-hoc
Client computer and machine setting where wireless communication occurs on a peer-to-
peer basis, i.e., all clients in with the same SSID/network name communicate directly with
each other. No access point is required. This machine does not support ad-hoc
communication.
Admin Password
Administration password in IJ Network Tool to restrict access to network users. It must be
entered to access the printer and change printer settings.
When the printer's network settings are factory default, the admin password does not have
to been entered.
AES
An encryption method. It is optional for WPA. Strong cryptographic algorithm adopted within
U.S. government organizations for information processing.
Authentication Method
The method that an access point uses to authenticate a printer through a wireless LAN. The
methods are agreeable each other.
When using WEP as an encryption method, the authentication method is able to fix to
Open
System
or
Shared Key
.
For WPA/WPA2, authentication method is PSK.
Auto
The printer automatically changes its authentication method to match the access point.
Open System
In this authentication method, the communication partner is authenticated without using
WEP key even if
Use WEP
is selected.
Shared Key