Dell B1265dfw Dell Users Guide - Page 168

Installer OS X, Printer Self Network

Page 168 highlights

Wireless network setup - The machine installed with a wireless network interface - USB cable 1 Make sure that the machine is connected to your network and powered on. 11 The software searches the wireless network devices. If the search has failed, check if the USB cable is connected between the computer and machine properly, and follow the instructions in the window. 2 Insert the supplied software CD into your CD/DVD drive. 3 Double-click the CD/DVD icon that appears on your Mac desktop. • For Mac OS X 10.8, Double-click the CD/DVD icon that appears on your Finder. 4 Double-click the MAC_Installer folder > Installer OS X icon. 5 Click Continue. 6 Read the license agreement and click Continue. 7 Click Agree to agree to the license agreement. 8 Click Install. All components necessary for machine operations will be installed. If you click Customize, you can choose individual components to install. 9 Enter the password and click OK. 10 Select Wireless connection on the Printer Connection Type and click Continue. 12 After searching the wireless networks, a list of wireless networks your machine has searched appears. If you want to use the Dell default ad hoc setting, select the last wireless network on the list, which Network Name(SSID) is Dell_device and Signal is Printer Self Network. Then, click Next. If you want to use other ad hoc settings, select another wireless network from the list. If you want to change ad hoc settings click the Advanced Setting button. • Enter the wireless Network Name: Enter the SSID name you want (SSID is case-sensitive). • Operation Mode: Select ad hoc. • Channel: Select the channel (Auto Setting or 2412 MHz to 2467 MHz). • Authentication: Select an authentication type. Open System: Authentication is not used, and encryption may or may not be used, depending on the need for data security. Shared Key: Authentication is used. A device that has a proper WEP key can access the network. • Encryption: Select the encryption (None, WEP64, WEP128). 2. Using a Network-Connected Machine 168

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284

Wireless network setup±
-
The machine installed with a wireless network interface±
-
USB cable
±
Make sure that the machine is connected to your network and powered
1
on.±
Insert the supplied software CD into your CD/DVD drive.±
2
Double-click the CD/DVD icon that appears on your Mac desktop.
3
For Mac OS X 10.8, Double-click the CD/DVD icon that appears on
your Finder.
Double-click the
MAC_Installer
folder >
Installer OS X
icon.
4
Click
Continue
.
5
Read the license agreement and click
Continue
.
6
Click
Agree
to agree to the license agreement.
7
Click
Install
. All components necessary for machine operations will be
8
installed.±
If you click
Customize
, you can choose individual components to install.±
Enter the password and click
OK
9
Select
Wireless connection
on the
Printer Connection Type
and click
10
Continue
.
The software searches the wireless network devices.
11
If the search has failed, check if the USB cable is connected between the
computer and machine properly, and follow the instructions in the window.
After searching the wireless networks, a list of wireless networks your
12
machine has searched appears.
If you want to use the Dell default ad hoc setting, select the last wireless
network on the list, which
Network Name(SSID)
is
Dell_device
and
Signal
is
Printer Self Network
.
Then, click
Next
.
If you want to use other ad hoc settings, select another wireless network
from the list.
If you want to change ad hoc settings click the
Advanced Setting
button.
Enter the wireless Network Name:
Enter the SSID name you want (SSID
is case-sensitive).
Operation Mode:
Select ad hoc.
Channel:
Select the channel (
Auto Setting
or 2412 MHz to 2467 MHz).
Authentication:
Select an authentication type.
Open System:
Authentication is not used, and encryption may or may
not be used, depending on the need for data security.
Shared Key:
Authentication is used. A device that has a proper WEP key
can access the network.
Encryption:
Select the encryption (None, WEP64, WEP128).
2.
Using a Network-Connected Machine±
168