Konica Minolta bizhub 5000i bizhub 5000i/4000i User Guide - Page 312

Open System, PEAP, Peer-to-Peer, Protocols, Public Key Cryptosystem, RARP, Resolution, Secure

Page 312 highlights

Home > Glossary Open System Open System is one of the network authentication methods. Under open system authentication, any wireless devices are allowed to access the network without requiring a WEP key. PEAP Protected Extensible Authentication Protocol (PEAP) is a version of EAP method developed by Cisco Systems, Inc., Microsoft Corporation and RSA Security. PEAP creates an encrypted Secure Sockets Layer (SSL)/ Transport Layer Security (TLS) tunnel between a client and an authentication server, for sending a user ID and password. PEAP provides mutual authentication between the server and the client. This machine supports the following inner authentications: • PEAP/MS-CHAPv2 • PEAP/GTC Peer-to-Peer Peer-to-Peer is a type of printing in a peer-to-peer environment. In a peer-to-peer environment, each computer sends and receives data directly to and from each device. There is no central server controlling access or machine sharing. Protocols Protocols are the standardized sets of rules for transmitting data on a network. Protocols allow users to gain access to network-connected resources. The print server used on your machine supports the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol. Public Key Cryptosystem A Public Key Cryptosystem is a modern branch of cryptography in which the algorithms employ a pair of keys (a public key and a private key) and use a different component of the pair for different steps of the algorithm. RARP Reverse Address Resolution Protocol (RARP) finds the logical address for a machine that knows only its physical address. To use RARP, contact your network administrator. Resolution The number of vertical and horizontal lines per inch. Secure Function Lock 3.0 Secure Function Lock 3.0 increases security by restricting the use of functions. 308

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317

Open System
Open System is one of the network authentication methods. Under open system authentication, any wireless
devices are allowed to access the network without requiring a WEP key.
PEAP
Protected Extensible Authentication Protocol (PEAP) is a version of EAP method developed by Cisco Systems,
Inc., Microsoft Corporation and RSA Security. PEAP creates an encrypted Secure Sockets Layer (SSL)/
Transport Layer Security (TLS) tunnel between a client and an authentication server, for sending a user ID and
password. PEAP provides mutual authentication between the server and the client.
This machine supports the following inner authentications:
PEAP/MS-CHAPv2
PEAP/GTC
Peer-to-Peer
Peer-to-Peer is a type of printing in a peer-to-peer environment. In a peer-to-peer environment, each computer
sends and receives data directly to and from each device. There is no central server controlling access or
machine sharing.
Protocols
Protocols are the standardized sets of rules for transmitting data on a network. Protocols allow users to gain
access to network-connected resources. The print server used on your machine supports the Transmission
Control Protocol/Internet Protocol (TCP/IP) protocol.
Public Key Cryptosystem
A Public Key Cryptosystem is a modern branch of cryptography in which the algorithms employ a pair of keys (a
public key and a private key) and use a different component of the pair for different steps of the algorithm.
RARP
Reverse Address Resolution Protocol (RARP) finds the logical address for a machine that knows only its physical
address.
To use RARP, contact your network administrator.
Resolution
The number of vertical and horizontal lines per inch.
Secure Function Lock 3.0
Secure Function Lock 3.0 increases security by restricting the use of functions.
Home > Glossary
308