Brother International MFC-J4710DW Network Users Manual - English - Page 96

Security terms, Authentication and Encryption

Page 96 highlights

Wireless network terms and concepts Security terms 12 Authentication and Encryption 12 Most wireless networks use some kind of security settings. These security settings define the authentication (how the device identifies itself to the network) and encryption (how the data is encrypted as it is sent on the network). If you do not correctly specify these options when you are configuring your Brother wireless machine, it will not be able to connect to the wireless network. Therefore care must be taken when configuring these options. To see which authentication and encryption methods your Brother wireless machine supports, see Appendix A on page 97. Authentication and Encryption methods for a personal wireless network 12 A personal wireless network is a small network, for example using your machine in a wireless network at home, without IEEE 802.1x support. Authentication methods 12  Open system Wireless devices are allowed to access the network without any authentication.  Shared key A secret pre-determined key is shared by all devices that will access the wireless network. The Brother wireless machine uses the WEP key as the pre-determined key.  WPA-PSK/WPA2-PSK Enables a Wi-Fi Protected Access Pre-shared key (WPA-PSK/WPA2-PSK), which enables the Brother wireless machine to associate with access points using TKIP for WPA-PSK or AES for WPA-PSK and WPA2-PSK (WPA-Personal). 12 Encryption methods 12  None No encryption method is used.  WEP When using WEP (Wired Equivalent Privacy), the data is transmitted and received with a secure key.  TKIP TKIP (Temporal Key Integrity Protocol) provides per-packet key mixing, a message integrity check and rekeying mechanism.  AES AES (Advanced Encryption Standard) provides stronger data protection by using a symmetric-key encryption. NOTE • IEEE 802.11n does not support WEP and TKIP for the encryption method. 90

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110

Wireless network terms and concepts
90
12
Security terms
12
Authentication and Encryption
12
Most wireless networks use some kind of security settings. These security settings define the authentication
(how the device identifies itself to the network) and encryption (how the data is encrypted as it is sent on the
network).
If you do not correctly specify these options when you are configuring your Brother wireless
machine, it will not be able to connect to the wireless network.
Therefore care must be taken when
configuring these options. To see which authentication and encryption methods your Brother wireless
machine supports, see
Appendix A
on page 97.
Authentication and Encryption methods for a personal wireless network
12
A personal wireless network is a small network, for example using your machine in a wireless network at
home, without IEEE 802.1x support.
Authentication methods
12
Open system
Wireless devices are allowed to access the network without any authentication.
Shared key
A secret pre-determined key is shared by all devices that will access the wireless network.
The Brother wireless machine uses the WEP key as the pre-determined key.
WPA-PSK/WPA2-PSK
Enables a Wi-Fi Protected Access Pre-shared key (WPA-PSK/WPA2-PSK), which enables the Brother
wireless machine to associate with access points using TKIP for WPA-PSK or AES for WPA-PSK and
WPA2-PSK (WPA-Personal).
Encryption methods
12
None
No encryption method is used.
WEP
When using WEP (Wired Equivalent Privacy), the data is transmitted and received with a secure key.
TKIP
TKIP (Temporal Key Integrity Protocol) provides per-packet key mixing, a message integrity check and
rekeying mechanism.
AES
AES (Advanced Encryption Standard) provides stronger data protection by using a symmetric-key
encryption.
NOTE
IEEE 802.11n does not support WEP and TKIP for the encryption method.