Brother International HL-6180DW Network User's Guide - English - Page 104

Network key, Authentication and Encryption methods for an enterprise wireless network

Page 104 highlights

Wireless network terms and concepts (For HL-5470DW(T) and HL-6180DW(T)) Network key 10  Open system/Shared key with WEP This key is a 64-bit or 128-bit value that must be entered in an ASCII or hexadecimal format. • 64 (40) bit ASCII: Uses 5 text characters. e.g. "WSLAN" (this is case sensitive) • 64 (40) bit hexadecimal: Uses 10 digits of hexadecimal data. e.g. "71f2234aba" • 128 (104) bit ASCII: Uses 13 text characters. e.g. "Wirelesscomms" (this is case sensitive) • 128 (104) bit hexadecimal: Uses 26 digits of hexadecimal data. e.g. "71f2234ab56cd709e5412aa2ba"  WPA-PSK/WPA2-PSK and TKIP or AES Uses a Pre-Shared Key (PSK) that is 8 or more characters in length, up to a maximum of 63 characters. Authentication and Encryption methods for an enterprise wireless network 10 An enterprise wireless network is a large network, for example using your machine in a business enterprise wireless network, with IEEE 802.1x support. If you configure your machine in an IEEE 802.1x supported wireless network, you can use the following authentication and encryption methods. Authentication methods  LEAP For LEAP, see LEAP (For wireless network) uu page 94.  EAP-FAST For EAP-FAST, see EAP-FAST uu page 94.  PEAP For PEAP, see PEAP uu page 94.  EAP-TTLS For EAP-TTLS, see EAP-TTLS uu page 95.  EAP-TLS For EAP-TLS, see EAP-TLS uu page 95. 10 10 98

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120

98
Wireless network terms and concepts (For HL-5470DW(T) and HL-6180DW(T))
10
Network key
10
Open system/Shared key with WEP
This key is a 64-bit or 128-bit value that must be entered in an ASCII or hexadecimal format.
64 (40) bit ASCII:
Uses 5 text characters. e.g. “WSLAN” (this is case sensitive)
64 (40) bit hexadecimal:
Uses 10 digits of hexadecimal data. e.g. “71f2234aba”
128 (104) bit ASCII:
Uses 13 text characters. e.g. “Wirelesscomms” (this is case sensitive)
128 (104) bit hexadecimal:
Uses 26 digits of hexadecimal data. e.g. “71f2234ab56cd709e5412aa2ba”
WPA-PSK/WPA2-PSK and TKIP or AES
Uses a Pre-Shared Key (PSK) that is 8 or more characters in length, up to a maximum of 63 characters.
Authentication and Encryption methods for an enterprise wireless network
10
An enterprise wireless network is a large network, for example using your machine in a business enterprise
wireless network, with IEEE 802.1x support. If you configure your machine in an IEEE 802.1x supported
wireless network, you can use the following authentication and encryption methods.
Authentication methods
10
LEAP
For LEAP, see
LEAP (For wireless network)
uu
page 94.
EAP-FAST
For EAP-FAST, see
EAP-FAST
uu
page 94.
PEAP
For PEAP, see
PEAP
uu
page 94.
EAP-TTLS
For EAP-TTLS, see
EAP-TTLS
uu
page 95.
EAP-TLS
For EAP-TLS, see
EAP-TLS
uu
page 95.