Samsung ML-3712DW User Manual (user Manual) (ver.1.02) (English) - Page 142

License Agreement, I accept the terms, of the License Agreement, Network NameSSID, portthru, Signal

Page 142 highlights

Wireless network setup 5 Read the License Agreement, and select I accept the terms of the License Agreement. Then, click Next. 6 The software searches the wireless network. If the software has failed to search the network, check if the USB cable is connected properly between the computer and machine, and follow the instruction in the window. 7 After searching the wireless networks, a list of wireless networks your machine has searched appears. If you want to use the Samsung default ad hoc setting, select the last wireless network on the list, Network Name(SSID) is portthru and Signal is Printer Self Network. Then, click Next. If you want to use other ad hoc settings, select another wireless network from the list. If you want to change ad hoc settings click the Advanced Setting button. • Enter the wireless Network Name: Enter the SSID name you want (SSID is case-sensitive). • Operation Mode: Select ad hoc. 2. Using a network-connected machine 39 • Channel: Select the channel. (Auto Setting or 2412 MHz to 2467 MHz). • Authentication: Select an authentication type. Open System: Authentication is not used, and encryption may or may not be used, depending on the need for data security. Shared Key: Authentication is used. A device that has a proper WEP key can access the network. • Encryption: Select the encryption (None, WEP64, WEP128). • Network Key: Enter the encryption network key value. • Confirm Network Key: Confirm the encryption network key value. • WEP Key Index: If you are using WEP Encryption, select the appropriate WEP Key Index. The wireless network security window appears when the ad hoc network has security setting. The wireless network security window appears. Select Open System or Shared Key for the authentication and click Next. • WEP (Wired Equivalent Privacy) is a security protocol preventing unauthorized access to your wireless network. WEP encrypts the data portion of each packet exchanged on a wireless network using a 64-bit or 128-bit WEP encryption key.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245

Wireless network setup
39
2.
Using a network-connected machine
5
Read the
License Agreement
, and select
I accept the terms
of the License Agreement
. Then, click
Next
.
6
The software searches the wireless network.
If the software has failed to search the network, check if the
USB cable is connected properly between the computer and
machine, and follow the instruction in the window.
7
After searching the wireless networks, a list of wireless
networks your machine has searched appears.
If you want to use the Samsung default ad hoc setting, select
the last wireless network on the list,
Network Name(SSID)
is
portthru
and
Signal
is
Printer Self Network
.
Then, click
Next
.
If you want to use other ad hoc settings, select another
wireless network from the list.
If you want to change ad hoc settings click the
Advanced
Setting
button.
Enter the wireless Network Name:
Enter the SSID name
you want (SSID is case-sensitive).
Operation Mode:
Select ad hoc.
Channel:
Select the channel. (
Auto Setting
or 2412 MHz
to 2467 MHz).
Authentication:
Select an authentication type.
Open System:
Authentication is not used, and encryption
may or may not be used, depending on the need for data
security.
Shared Key:
Authentication is used. A device that has a
proper WEP key can access the network.
Encryption:
Select the encryption (None, WEP64,
WEP128).
Network Key:
Enter the encryption network key value.
Confirm Network Key:
Confirm the encryption network
key value.
WEP Key Index:
If you are using WEP Encryption, select
the appropriate
WEP Key Index
.
The wireless network security window appears when the ad
hoc network has security setting.
The wireless network security window appears. Select
Open
System
or
Shared Key
for the authentication and click
Next
.
WEP (Wired Equivalent Privacy) is a security protocol
preventing unauthorized access to your wireless network.
WEP encrypts the data portion of each packet exchanged
on a wireless network using a 64-bit or 128-bit WEP
encryption key.