Samsung ML-3712DW User Manual (user Manual) (ver.1.02) (English) - Page 139

Encryption, Network Key, Confirm Network Key, WEP Key Index, WEP Key Index, Open System, Shared Key

Page 139 highlights

Wireless network setup • Encryption: Select the encryption (None, WEP64, WEP128, TKIP, AES, TKIP AES). • Network Key: Enter the encryption network key value. • Confirm Network Key: Confirm the encryption network key value. • WEP Key Index: If you are using WEP Encryption, select the appropriate WEP Key Index. 2. Using a network-connected machine 36 The wireless network security window appears when the access point has security settings. The wireless network security window appears. The window may differ according to its security mode: WEP, or WPA. • WEP Select Open System or Shared Key for the authentication and enter the WEP security key. Click Next. WEP (Wired Equivalent Privacy) is a security protocol preventing unauthorized access to your wireless network. WEP encrypts the data portion of each packet exchanged on a wireless network using a 64-bit or 128-bit WEP encryption key. • WPA Enter the WPA shared key and click Next. WPA authorizes and identifies users based on a secret key that changes automatically at regular intervals. WPA also uses TKIP (Temporal Key Integrity Protocol) and AES (Advanced Encryption Standard) for data encryption.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245

Wireless network setup
36
2.
Using a network-connected machine
Encryption:
Select the encryption (None, WEP64,
WEP128, TKIP, AES, TKIP AES).
Network Key:
Enter the encryption network key value.
Confirm Network Key:
Confirm the encryption network
key value.
WEP Key Index:
If you are using WEP Encryption, select
the appropriate
WEP Key Index
.
The wireless network security window appears when the
access point has security settings.
The wireless network security window appears. The window
may differ according to its security mode: WEP, or WPA.
WEP
Select
Open System
or
Shared Key
for the authentication
and enter the WEP security key. Click
Next
.
WEP (Wired Equivalent Privacy) is a security protocol
preventing unauthorized access to your wireless network.
WEP encrypts the data portion of each packet exchanged
on a wireless network using a 64-bit or 128-bit WEP
encryption key.
WPA
Enter the WPA shared key and click
Next
.
WPA authorizes and identifies users based on a secret key
that changes automatically at regular intervals. WPA also
uses TKIP (Temporal Key Integrity Protocol) and AES
(Advanced Encryption Standard) for data encryption.