Samsung Network Printer manual None security mode settings, Static WEP security mode settings

Page 27

Security

Authentication

Encryption method

method

mode

employed

employed

 

 

 

 

 

Static

Open System,

Static WEP encryption

WEP

Shared key, or

 

 

optionally 802.1x

 

 

authentication

 

 

(EAP-MD5 or EAP-

 

 

MSCHAPv2) if

 

 

needed.

 

 

 

 

Enhanced

WPA-PSK

Using dynamic key

Security

 

management

 

 

TKIP, and AES

 

 

 

 

EAP-TLS

Using dynamic key

 

 

management

 

 

TKIP, AES, 64-bit WEP, and

 

 

128-bit WEP

 

 

 

 

EAP-TTLS

Using dynamic key

 

 

management

 

 

TKIP, AES, 64-bit WEP, and

 

 

128-bit WEP

 

 

 

 

PEAP

Using dynamic key

 

 

management

 

 

TKIP, AES, 64-bit WEP, and

 

 

128-bit WEP

 

 

 

NOTE: The Samsung network print server provides “None” and Static WEP without 802.1x authentication in Ad hoc mode while “None,” Static WEP with 802.1x authentication, and Enhanced security are provided in Infrastructure mode.

You may first choose one of the security modes and configure additional parameters for each security mode.

“None” security mode settings

This uses Open System for IEEE 802.11 authentication and doesn't require additional parameter settings.

Static WEP security mode settings

To use Static WEP, you need to configure the following parameters:

IEEE 802.11 Authentication: Choose one of the following IEEE 802.11 authentications:

-Open System: This is used if your wireless network does not require authentication for network access. However, your network may still use encryption keys for data security.

-Shared Key: Use Shared Key authentication if your network requires that each device be configured with the same secret WEP key for network access.

WEP Encryption: Choose either 64-bit WEP or 128-bit WEP. If your network uses WEP encryption keys, you must configure the encryption keys.

Key 1/2/3/4: You need to specify a static WEP encryption key if your network uses WEP encryption keys. You can configure up to four keys. The active key (called using key) must match the value and active key position (for example, Key 1) configured on other wireless devices. The appropriate key size must be configured according to the WEP key entry format and the WEP encryption key type. The following table shows how to configure encryption keys using HEX or ASCII values.

Key

Hexadecimal format

ASCII format

 

 

 

64-bit

10 digits (0~9, A~F)

5 alphanumeric

WEP

 

characters

 

 

 

128-bit

26 digits (0~9, A~F)

13 alphanumeric

WEP

 

characters

 

 

 

802.1x Authentication: Choose one of the IEEE 802.1x

authentications: None, EAP-MD5, or EAP-MSCHAPv2.

User Name: 802.1x EAP authentication methods, such as EAP-MD5, EAP-MSCAHPv2, EAP-TTLS, and PEAP, require an EAP user name as an account name. A user name consisting of up to 31 characters is necessary, if 802.1x authentication is enabled. This is not saved as the default value.

User Password: 802.1x EAP authentication methods, such as EAP-MD5, EAP-MSCAHPv2, EAP-TTLS, and PEAP, require an EAP user password as an account password. A password consisting of up to 15 characters is necessary, if 802.1x authentication is enabled. This is not saved as the default value.

Enhanced Security mode settings

WPA authentication: WPA supports WPA-PSK and IEEE 802.1x for authentication. Choose either authentication method.

Encryption: Choose one of the encryption key types: TKIP, AES, 64-bit WEP, or 128-bit WEP. WPA supports TKIP and AES for data encryption.

WPA Shared Key: If you are using WPA-PSK, the print server WPA shared key must be the same as that of an access point. The WPA shared key is used to authenticate and to create a master session key.

802.1x Authentication: You must select an authentication method which is supported by a RADIUS server. The authentication method is determined by negotiation between clients and the server. Therefore, it is not necessary for the selected authentication to be higher priority on a RADIUS server. Available authentications are NONE, EAP-MD5, EAP MSCHAPv2 in 802.1x Authentication on Static WEB security.

6.5

Wireless network environment

Image 27
Contents Page Page Contents Appendix For products fitted with EU-approved radio devices Federal Communications Commission FCCPlace and the system is fully assembled Supported network environments Package contentsGetting started IntroductionIBM Installing your Network Printer CardSystem requirements Computer RequirementsPrograms supplied on the Network Utilities CD Installing softwareUninstalling software Viewing the SyncThru Web Admin Service User’s GuideIP address setup Using SetIPUsing SyncThru Web Admin Service Using SyncThru Web Service Click Devices Æ Add deviceEnter your print server’s TCP/IP addresses and click Apply TCP/IP environment Configuring DHCP/BOOTPConfiguring Snmp Using SnmpDynamic DNS Ddns Configuring SLPUsing SLP Configuring DdnsBonjour Configuring WinsConfiguring UPnP Using UPnPPrinting protocols Standard TCP/IP portLPR port Windows 2000/XP/2003 Configuring IPP in the print serverSamsung Printer Port IPP portAdditional functions Ethernet speed ResetClick Network Settings Æ Reset Click Network Settings Æ GeneralConfiguring NetWare NetWare environmentNetWare printing Assignments menu Printing in NetWareAdding a queue Adding a printerEtherTalk printing Configuring EtherTalkConfiguring the printer EtherTalk environmentBonjour printer TCP/IP printingWireless network environment OverviewBasic concept and terms Ieee Ieee 802.11 authentication WPA Wi-Fi Protected Access WEP encryptionStatus Description Before configuring the print serverWireless settings Select Network Settings Æ WirelessWireless basic settings Wireless security settings Security Authentication Encryption method Method ModeNone Open System No encryption None security mode settings Static WEP security mode settingsEnhanced Security mode settings Select File Æ Add/Remove Snap-in Click ConfigureUsing WPA-PSK Using EAP-TLSUsing EAP-TTLS Appendix SpecificationsWireless specifications Items SpecificationsOpenSSL Statements OpenSSL LicenseDisclaimer Ad hoc peer-to-peer mode Bonjour BootpDdns Dhcp Http SLP Snmp UPnP Static WEP 6.4 WEP encryption Rev.1.00