Dell B1265dfw Dell Users Guide - Page 166

Agree, Continue, Wireless Network Setting, User Options Pane

Page 166 highlights

Wireless network setup 8 Click Agree to agree to the license agreement. 9 When the message that warns that all applications will close on your computer appears, click Continue. 10 Click Wireless Network Setting button on the User Options Pane. 11 The software searches the wireless network. If the search has failed, you may check if the USB cable is connected between the computer and machine properly, and follow the instructions in the window. 12 After searching, the window shows the wireless network devices. Select the name (SSID) of the access point you are using and click Next. When you set the wireless configuration manually, click Advanced Setting. • Enter the wireless Network Name: Enter the SSID of the access point you want with (SSID is case-sensitive). • Operation Mode: Select Infrastructure. • Authentication: Select an authentication type. Open System: Authentication is not used, and encryption may or may not be used, depending on the need for data security. Shared Key: Authentication is used. A device that has a proper WEP key can access the network. WPA Personal or WPA2 Personal: Select this option to authenticate the print server based on WPA Pre-Shared Key. This uses a shared secret key (generally called Pre- Shared Key pass phrase) that is manually configured on the access point and each of its clients. • Encryption: Select the encryption. (None, WEP64, WEP128, TKIP, AES, TKIP, AES) • Network Key: Enter the encryption network key value. • Confirm Network Key: Confirm the encryption network key value. • WEP Key Index: If you are using WEP Encryption, select the appropriate WEP Key Index. The wireless network security window appears when the access point has security setting. The wireless network security window appears. The window may differ according to its security mode: WEP or WPA. • WEP Select Open System or Shared Key for the authentication and enter the WEP security key. Click Next. WEP (Wired Equivalent Privacy) is a security protocol preventing unauthorized access to your wireless network. WEP encrypts the data portion of each packet exchanged on a wireless network using a 64-bit or 128-bit WEP encryption key. • WPA Enter the WPA shared key and click Next. WPA authorizes and identifies users based on a secret key that changes automatically at regular intervals. WPA also uses TKIP (Temporal Key Integrity Protocol) and AES (Advanced Encryption Standard) for data encryption. 2. Using a Network-Connected Machine 166

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284

Wireless network setup±
Click
Agree
to agree to the license agreement.
8
When the message that warns that all applications will close on your
9
computer appears, click
Continue
.
Click
Wireless Network Setting
button on the
User Options Pane
.
10
The software searches the wireless network.
11
If the search has failed, you may check if the USB cable is connected
between the computer and machine properly, and follow the instructions in
the window.
After searching, the window shows the wireless network devices. Select
12
the name (SSID) of the access point you are using and click
Next
.
When you set the wireless configuration manually, click
Advanced Setting
.
Enter the wireless Network Name:
Enter the SSID of the access point
you want with (SSID is case-sensitive).
Operation Mode:
Select
Infrastructure
.
Authentication:
Select an authentication type.
Open System:
Authentication is not used, and encryption may or may
not be used, depending on the need for data security.
Shared Key:
Authentication is used. A device that has a proper WEP key
can access the network.
WPA Personal or WPA2 Personal:
Select this option to authenticate the
print server based on WPA Pre-Shared Key. This uses a shared secret key
(generally called Pre- Shared Key pass phrase) that is manually
configured on the access point and each of its clients.
Encryption:
Select the encryption. (None, WEP64, WEP128, TKIP, AES,
TKIP, AES)
Network Key:
Enter the encryption network key value.
Confirm Network Key:
Confirm the encryption network key value.
WEP Key Index:
If you are using WEP Encryption, select the appropriate
WEP Key Index
.
The wireless network security window appears when the access point has
security setting.
The wireless network security window appears. The window may differ
according to its security mode: WEP or WPA.
WEP
Select
Open System
or
Shared Key
for the authentication and enter the
WEP security key. Click
Next
.
WEP (Wired Equivalent Privacy) is a security protocol preventing
unauthorized access to your wireless network. WEP encrypts the data
portion of each packet exchanged on a wireless network using a 64-bit
or 128-bit WEP encryption key.
WPA
Enter the WPA shared key and click
Next
.
WPA authorizes and identifies users based on a secret key that changes
automatically at regular intervals. WPA also uses TKIP (Temporal Key
Integrity Protocol) and AES (Advanced Encryption Standard) for data
encryption.
2.
Using a Network-Connected Machine±
166