Dell B1160W User Manual - Page 89

Enter the wireless Network Name, Operation Mode, Infrastructure, Authentication, Encryption

Page 89 highlights

Wireless network setup 7 After searching, the window shows the wireless network devices. Select the name (SSID) of the access point you are using and click Next. If you cannot find the network name you want to choose, or if you want to set the wireless configuration manually, click Advanced Setting. • Enter the wireless Network Name: Enter the SSID of access point you want (SSID is case-sensitive). • Operation Mode: Select Infrastructure. • Authentication: Select an authentication type. Open System: Authentication is not used, and encryption may or may not be used, depending on the need for data security. Shared Key: Authentication is used. A device that has a proper WEP key can access the network. WPA Personal or WPA2 Personal: Select this option to authenticate the print server based on WPA Pre-Shared Key. This uses a shared secret key (generally called Pre- Shared Key pass phrase) which is manually configured on the access point and each of its clients. • Encryption: Select the encryption (None, WEP64, WEP128, TKIP, AES, TKIP AES). • Network Key: Enter the encryption network key value. • Confirm Network Key: Confirm the encryption network key value. • WEP Key Index: If you are using WEP Encryption, select the appropriate WEP Key Index. The wireless network security window appears when the access point has security settings. The wireless network security window appears. The window may differ according to its security mode: WEP, or WPA. • WEP Select Open System or Shared Key for the authentication and enter the WEP security key. Click Next. WEP (Wired Equivalent Privacy) is a security protocol preventing unauthorized access to your wireless network. WEP encrypts the data portion of each packet exchanged on a wireless network using a 64-bit or 128-bit WEP encryption key. • WPA Enter the WPA shared key and click Next. WPA authorizes and identifies users based on a secret key that changes automatically at regular intervals. WPA also uses TKIP (Temporal Key Integrity Protocol) and AES (Advanced Encryption Standard) for data encryption. 2. Using a Network-Connected Machine (B1160w only) 89

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165

Wireless network setup
89
2.
Using a Network-Connected Machine (B1160w only)
7
After searching, the window shows the wireless network devices. Select
the name (SSID) of the access point you are using and click
Next
.
If you cannot find the network name you want to choose, or if you want to
set the wireless configuration manually, click
Advanced Setting
.
Enter the wireless Network Name:
Enter the SSID of access point you
want (SSID is case-sensitive).
Operation Mode:
Select
Infrastructure
.
Authentication:
Select an authentication type.
Open System:
Authentication is not used, and encryption may or may
not be used, depending on the need for data security.
Shared Key:
Authentication is used. A device that has a proper WEP key
can access the network.
WPA Personal or WPA2 Personal:
Select this option to authenticate the
print server based on WPA Pre-Shared Key. This uses a shared secret key
(generally called Pre- Shared Key pass phrase) which is manually
configured on the access point and each of its clients.
Encryption:
Select the encryption (None, WEP64, WEP128, TKIP, AES,
TKIP AES).
Network Key:
Enter the encryption network key value.
Confirm Network Key:
Confirm the encryption network key value.
WEP Key Index:
If you are using WEP Encryption, select the appropriate
WEP Key Index
.
The wireless network security window appears when the access point has
security settings.
The wireless network security window appears. The window may differ
according to its security mode: WEP, or WPA.
WEP
Select
Open System
or
Shared Key
for the authentication and enter the
WEP security key. Click
Next
.
WEP (Wired Equivalent Privacy) is a security protocol preventing
unauthorized access to your wireless network. WEP encrypts the data
portion of each packet exchanged on a wireless network using a 64-bit
or 128-bit WEP encryption key.
WPA
Enter the WPA shared key and click
Next
.
WPA authorizes and identifies users based on a secret key that changes
automatically at regular intervals. WPA also uses TKIP (Temporal Key
Integrity Protocol) and AES (Advanced Encryption Standard) for data
encryption.