Samsung SL-M4020ND/XAA User Manual Ver.1.01 (English) - Page 159

Items to prepare, Creating the ad hoc network in Mac, MAC_Installer, Installer OS X, Continue, Agree

Page 159 highlights

Wireless network setup Items to prepare • Network-connected computer • Software CD that was provided with your machine • A machine installed with a wireless network interface • USB cable Creating the ad hoc network in Mac 1 Check whether the USB cable is connected to the machine. 2 Turn on your computer and the wireless network machine. 3 Insert the supplied software CD into your CD-ROM drive. 4 Double -click the CD-ROM icon that appears on your Mac desktop. 5 Double-click the MAC_Installer folder > Installer OS X icon. 6 Click Continue. 7 Read the license agreement and click Continue. 8 Click Agree to agree to the license agreement. 9 When the message that warns that all applications will close on your computer appears, click Continue. 10 Click Wireless Network Setting button on the User Options Pane. 11 After searching the wireless networks, a list of wireless networks your machine has searched appears. Click Advanced Setting. • Enter the wireless Network Name: Enter the SSID name (SSID is casesensitive). • Operation Mode: Select ad hoc. • Channel: Select the channel (Auto Setting or 2412 MHz to 2467 MHz). • Authentication: Select an authentication type. Open System: Authentication is not used, and encryption may or may not be used, depending on the need for data security. Shared Key: Authentication is used. A device that has a proper WEP key can access the network. • Encryption: Select the encryption (None, WEP64, WEP128). • Network Password: Enter the encryption network password value. • Confirm Network Password: Confirm the encryption network password value. • WEP Key Index: If you are using WEP Encryption, select the appropriate WEP Key Index. The wireless network security window appears when the ad hoc network has security setting. Select Open System or Shared Key for the authentication and click Next. • WEP (Wired Equivalent Privacy) is a security protocol preventing unauthorized access to your wireless network. WEP encrypts the data portion of each packet exchanged on a wireless network using a 64-bit or 128-bit WEP encryption key. 2. Using a Network-Connected Machine 159

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273

Wireless network setup
159
2.
Using a Network-Connected Machine
Items to prepare
Network-connected computer
Software CD that was provided with your machine
A machine installed with a wireless network interface
USB cable
Creating the ad hoc network in Mac
1
Check whether the USB cable is connected to the machine.
2
Turn on your computer and the wireless network machine.
3
Insert the supplied software CD into your CD-ROM drive.
4
Double -click the CD-ROM icon that appears on your Mac desktop.
5
Double-click the
MAC_Installer
folder >
Installer OS X
icon.
6
Click
Continue
.
7
Read the license agreement and click
Continue
.
8
Click
Agree
to agree to the license agreement.
9
When the message that warns that all applications will close on your
computer appears, click
Continue
.
10
Click
Wireless Network Setting
button on the
User Options Pane
.
11
After searching the wireless networks, a list of wireless networks your
machine has searched appears. Click
Advanced Setting
.
Enter the wireless Network Name:
Enter the SSID name (SSID is case-
sensitive).
Operation Mode:
Select ad hoc.
Channel:
Select the channel (
Auto Setting
or 2412 MHz to 2467 MHz).
Authentication:
Select an authentication type.
Open System:
Authentication is not used, and encryption may or may
not be used, depending on the need for data security.
Shared Key:
Authentication is used. A device that has a proper WEP key
can access the network.
Encryption:
Select the encryption (None, WEP64, WEP128).
Network Password:
Enter the encryption network password value.
Confirm Network Password:
Confirm the encryption network
password value.
WEP Key Index:
If you are using WEP Encryption, select the appropriate
WEP Key Index
.
The wireless network security window appears when the ad hoc network
has security setting.
Select
Open System
or
Shared Key
for the authentication and click
Next
.
WEP (Wired Equivalent Privacy) is a security protocol preventing
unauthorized access to your wireless network. WEP encrypts the data
portion of each packet exchanged on a wireless network using a 64-bit
or 128-bit WEP encryption key.