Lexmark E460DW Wireless Setup Guide - Page 31
WPA Wi-Fi Protected Access, WEP Wired Equivalent Privacy
UPC - 734646083669
View all Lexmark E460DW manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 31 highlights
router security key signal strength SSID (Service Set Identifier) static IP address switch UAA (Universally Administered Address) USB cable USB port WEP (Wired Equivalent Privacy) wireless access point wireless router Wi-Fi WPA (Wi-Fi Protected Access) WPA2 A device that shares a single Internet connection with multiple computers or other devices. The router controls network traffic. A password, such as a WEP key or a WPA passphrase, used to make a network secure. Measure of how strongly a transmitted signal is being received. The name of a wireless network. When you connect a printer to a wireless network, the printer needs to use the same SSID as the network. Also referred to as network name or BSS (Basic Service Set). An IP address assigned manually by you. A device similar to a network hub that can connect different networks together. An address assigned to a network printer or print server by the manufacturer. This address is associated with the network adapter and is usually the MAC address. To find the UAA, print a network setup page and look for the UAA listing. A lightweight, flexible cable that lets the printer communicate with the computer at much higher speeds than parallel or serial cables. A small, rectangular port on the back of the computer that connects the peripheral devices using a USB cable. A security setting that helps prevent unauthorized access to a wireless network. A device that connects wireless devices together to form a wireless network. A router that also serves as a wireless access point. An industry term that describes the technology used to create a wireless local area network (WLAN). A security setting that helps prevent unauthorized access to a wireless network. WPA is not supported on ad hoc wireless networks. A newer version of WPA. Older routers are less likely to support this form of security. Networking glossary 31