Brother International 9840CDW Users Manual - English - Page 252

Authentication and encryption for wireless users only, Authentication method, Encryption methods

Page 252 highlights

Authentication and encryption for wireless users only E Authentication method E The Brother machine supports the following methods: „ Open system Wireless devices are allowed to access the network without any authentication. „ Shared key A secret pre-determined key is shared by all devices that will access the wireless network. The Brother machine uses the WEP keys as the pre-determined key. „ WPA-PSK/WPA2-PSK Enables a Wi-FI® Protected Access Pre-Shared Key (WPA-PSK/WPA2-PSK), which enables the Brother wireless machine to associate with access points using TKIP for WPA-PSK or AES for WPA-PSK and WPA2-PSK (WPA-Personal). „ LEAP Cisco® LEAP (Light Extensible Authentication Protocol) has been developed by Cisco Systems, Inc. and enables the Brother wireless product to associate with access points using CKIP and CMIC encryptions. Encryption methods E Encryption is used to secure the data that is sent over the wireless network. The Brother machine supports the following encryption methods: „ WEP By using WEP (Wired Equivalent Privacy), the data is transmitted and received with a secure key. „ TKIP TKIP (Temporal Key Integrity Protocol) provides per-packet key mixing a message integrity check and re-keying mechanism. „ AES AES (Advanced Encryption Standard) is Wi-Fi® authorized strong encryption standard. „ CKIP The original Key Integrity Protocol for LEAP by Cisco Systems, Inc. „ CMIC CMIC (Cisco Message Integrity Check) is the message integrity check mechanism for LEAP by Cisco Systems, Inc. 236

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265

236
Authentication and encryption for wireless users only
E
Authentication method
E
The Brother machine supports the following methods:
Open system
Wireless devices are allowed to access the network without any authentication.
Shared key
A secret pre-determined key is shared by all devices that will access the wireless network. The
Brother machine uses the WEP keys as the pre-determined key.
WPA-PSK/WPA2-PSK
Enables a Wi-FI
®
Protected Access Pre-Shared Key (WPA-PSK/WPA2-PSK), which enables
the Brother wireless machine to associate with access points using TKIP for WPA-PSK or AES
for WPA-PSK and WPA2-PSK (WPA-Personal).
LEAP
Cisco
®
LEAP (Light Extensible Authentication Protocol) has been developed by Cisco
Systems, Inc. and enables the Brother wireless product to associate with access points using
CKIP and CMIC encryptions.
Encryption methods
E
Encryption is used to secure the data that is sent over the wireless network. The Brother machine
supports the following encryption methods:
WEP
By using WEP (Wired Equivalent Privacy), the data is transmitted and received with a secure
key.
TKIP
TKIP (Temporal Key Integrity Protocol) provides per-packet key mixing a message integrity
check and re-keying mechanism.
AES
AES (Advanced Encryption Standard) is Wi-Fi
®
authorized strong encryption standard.
CKIP
The original Key Integrity Protocol for LEAP by Cisco Systems, Inc.
CMIC
CMIC (Cisco Message Integrity Check) is the message integrity check mechanism for LEAP
by Cisco Systems, Inc.