Samsung ML-2955ND User Manual (user Manual) (ver.1.0) (English) - Page 129

WPA Personal or WPA2 Personal

Page 129 highlights

Wireless network setup • Authentication: Select an authentication type. Open System: Authentication is not used, and encryption may or may not be used, depending on the need for data security. Shared Key: Authentication is used. A device that has a proper WEP key can access the network. WPA Personal or WPA2 Personal: Select this option to authenticate the print server based on WPA Pre-Shared Key. This uses a shared secret key (generally called PreShared Key pass phrase) which is manually configured on the access point and each of its clients. • Encryption: Select the encryption (None, WEP64, WEP128, TKIP, AES, TKIP AES). • Network Key: Enter the encryption network key value. • Confirm Network Key: Confirm the encryption network key value. • WEP Key Index: If you are using WEP Encryption, select the appropriate WEP Key Index. 2. Using a network-connected machine 39 The wireless network security window appears when the access point has security settings. The wireless network security window appears. The window may differ according to its security mode: WEP, or WPA. • WEP Select Open System or Shared Key for the authentication and enter the WEP security key. Click Next. WEP (Wired Equivalent Privacy) is a security protocol preventing unauthorized access to your wireless network. WEP encrypts the data portion of each packet exchanged on a wireless network using a 64-bit or 128-bit WEP encryption key. • WPA Enter the WPA shared key and click Next. WPA authorizes and identifies users based on a secret key that changes automatically at regular intervals. WPA also uses TKIP (Temporal Key Integrity Protocol) and AES (Advanced Encryption Standard) for data encryption.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230

Wireless network setup
39
2.
Using a network-connected machine
Authentication:
Select an authentication type.
Open System:
Authentication is not used, and encryption
may or may not be used, depending on the need for data
security.
Shared Key:
Authentication is used. A device that has a
proper WEP key can access the network.
WPA Personal or WPA2 Personal:
Select this option to
authenticate the print server based on WPA Pre-Shared
Key. This uses a shared secret key (generally called Pre-
Shared Key pass phrase) which is manually configured on
the access point and each of its clients.
Encryption:
Select the encryption (None, WEP64,
WEP128, TKIP, AES, TKIP AES).
Network Key:
Enter the encryption network key value.
Confirm Network Key:
Confirm the encryption network
key value.
WEP Key Index:
If you are using WEP Encryption, select
the appropriate
WEP Key Index
.
The wireless network security window appears when the
access point has security settings.
The wireless network security window appears. The window
may differ according to its security mode: WEP, or WPA.
WEP
Select
Open System
or
Shared Key
for the authentication
and enter the WEP security key. Click
Next
.
WEP (Wired Equivalent Privacy) is a security protocol
preventing unauthorized access to your wireless network.
WEP encrypts the data portion of each packet exchanged
on a wireless network using a 64-bit or 128-bit WEP
encryption key.
WPA
Enter the WPA shared key and click
Next
.
WPA authorizes and identifies users based on a secret key
that changes automatically at regular intervals. WPA also
uses TKIP (Temporal Key Integrity Protocol) and AES
(Advanced Encryption Standard) for data encryption.