Dell B1265dfw Dell Users Guide - Page 163

Enter the wireless Network Name, Confirm Network Key

Page 163 highlights

Wireless network setup 5 Choose Wireless. 6 The software searches the wireless network. If the software has failed to search the network, check if the USB cable is connected properly between the computer and machine, and follow the instruction in the window. 7 After searching the wireless networks, a list of wireless networks your machine has searched appears. Then, click (Plus) button. 8 The window showing the wireless network setting appears. Check the settings and click Next. • Enter the wireless Network Name: Enter the SSID name you want (SSID is case-sensitive). • Operation Mode: Select ad hoc. • Channel: Select the channel. (Auto Setting or 2412 MHz to 2467 MHz). • Authentication: Select an authentication type. Open System: Authentication is not used, and encryption may or may not be used, depending on the need for data security. Shared Key: Authentication is used. A device that has a proper WEP key can access the network. • Encryption: Select the encryption (None, WEP64, WEP128). • Network Key: Enter the encryption network key value. • Confirm Network Key: Confirm the encryption network key value. • WEP Key Index: If you are using WEP Encryption, select the appropriate WEP Key Index. The wireless network security window appears when the ad hoc network has security setting. The wireless network security window appears. Select Open System or Shared Key for the authentication and click Next. • WEP (Wired Equivalent Privacy) is a security protocol preventing unauthorized access to your wireless network. WEP encrypts the data portion of each packet exchanged on a wireless network using a 64-bit or 128-bit WEP encryption key. 2. Using a Network-Connected Machine 163

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284

5
Wireless network setup±
Choose
Wireless
.
The software searches the wireless network.
6
If the software has failed to search the network, check if the USB cable is
connected properly between the computer and machine, and follow the
instruction in the window.
After searching the wireless networks, a list of wireless networks your
7
machine has searched appears.±
Then, click ±
(Plus)
button.±
The window showing the wireless network setting appears. Check the ±
8
settings and click
Next
.
Enter the wireless Network Name:
Enter the SSID name you want (SSID
is case-sensitive).
Operation Mode:
Select ad hoc.
Channel:
Select the channel. (
Auto Setting
or 2412 MHz to 2467 MHz).
Authentication:
Select an authentication type.
Open System:
Authentication is not used, and encryption may or may
not be used, depending on the need for data security.
Shared Key:
Authentication is used. A device that has a proper WEP key
can access the network.
Encryption:
Select the encryption (None, WEP64, WEP128).
Network Key:
Enter the encryption network key value.
Confirm Network Key:
Confirm the encryption network key value.
WEP Key Index:
If you are using WEP Encryption, select the appropriate
WEP Key Index
.
The wireless network security window appears when the ad hoc network
has security setting.
The wireless network security window appears. Select
Open System
or
Shared Key
for the authentication and click
Next
.
WEP (Wired Equivalent Privacy) is a security protocol preventing
unauthorized access to your wireless network. WEP encrypts the data
portion of each packet exchanged on a wireless network using a 64-bit
or 128-bit WEP encryption key.
2.
Using a Network-Connected Machine±
163