Lexmark Xs463de User Guide - Page 56

Installing the printer on a wireless network (Windows), Security Method

Page 56 highlights

• Security Method-There are three basic options for Security Method: - WEP key If your network uses more than one WEP key, enter up to four in the provided spaces. Select the key currently in use on the network by selecting the Default WEP Transmit Key. or - WPA or WPA2 passphrase WPA includes encryption as an additional layer of security. The choices are AES or TKIP. Encryption must be set for the same type on the router and on the printer, or the printer will not be able to communicate on the network. - No security If your wireless network does not use any type of security, then you will not have any security information. Note: Using an unsecured wireless network is not recommended. If you are installing the printer on an 802.1X network using the Advanced method, then you may need the following: • Authentication type • Inner authentication type • 802.1X username and password • Certificates Note: For more information on configuring 802.1X security, see the Networking Guide on the Software and Documentation CD. Installing the printer on a wireless network (Windows) Before you install the printer on a wireless network, make sure that: • A wireless card is installed in your printer. • Your wireless network is set up and working properly. • The computer you are using is connected to the same wireless network where you want to set up the printer. 1 Connect the power cable to the printer and then to a properly grounded electrical outlet, and then turn the printer on. Additional printer setup 56

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317

Security Method
—There are three basic options for Security Method:
WEP key
If your network uses more than one WEP key, enter up to four in the provided spaces. Select the key currently
in use on the network by selecting the Default WEP Transmit Key.
or
WPA or WPA2 passphrase
WPA includes encryption as an additional layer of security. The choices are AES or TKIP. Encryption must be
set for the same type on the router and on the printer, or the printer will not be able to communicate on the
network.
No security
If your wireless network does not use any type of security, then you will not have any security information.
Note:
Using an unsecured wireless network is not recommended.
If you are installing the printer on an 802.1X network using the Advanced method, then you may need the following:
Authentication type
Inner authentication type
802.1X username and password
Certificates
Note:
For more information on configuring 802.1X security, see the
Networking Guide
on the
Software and
Documentation
CD.
Installing the printer on a wireless network (Windows)
Before you install the printer on a wireless network, make sure that:
A wireless card is installed in your printer.
Your wireless network is set up and working properly.
The computer you are using is connected to the same wireless network where you want to set up the printer.
1
Connect the power cable to the printer and then to a properly grounded electrical outlet, and then turn the printer
on.
Additional printer setup
56