Wireless network setup

7After searching, the window shows the wireless network devices. Select the name (SSID) of the access point you are using and click Next.

If you cannot find the network name you want to choose, or if you want to set the wireless configuration manually, click Advanced Setting.

Enter the wireless Network Name: Enter the SSID of access point you want (SSID is case-sensitive).

Operation Mode: Select Infrastructure.

Authentication: Select an authentication type.

Open System: Authentication is not used, and encryption may or may not be used, depending on the need for data security.

Shared Key: Authentication is used. A device that has a proper WEP key can access the network.

WPA Personal or WPA2 Personal: Select this option to authenticate the print server based on WPA Pre-Shared Key. This uses a shared secret key (generally called Pre- Shared Key pass phrase) which is manually configured on the access point and each of its clients.

Encryption: Select the encryption (None, WEP64, WEP128, TKIP, AES, TKIP AES).

Network Key: Enter the encryption network key value.

Confirm Network Key: Confirm the encryption network key value.

WEP Key Index: If you are using WEP Encryption, select the appropriate WEP Key Index.

The wireless network security window appears when the access point has security settings.

The wireless network security window appears. The window may differ according to its security mode: WEP, or WPA.

WEP

Select Open System or Shared Key for the authentication and enter the WEP security key. Click Next.

WEP (Wired Equivalent Privacy) is a security protocol preventing unauthorized access to your wireless network. WEP encrypts the data portion of each packet exchanged on a wireless network using a 64-bit or 128-bit WEP encryption key.

WPA

Enter the WPA shared key and click Next.

WPA authorizes and identifies users based on a secret key that changes automatically at regular intervals. WPA also uses TKIP (Temporal Key Integrity Protocol) and AES (Advanced Encryption Standard) for data encryption.

2. Using a Network-Connected Machine (B1160w only) 89

Page 89
Image 89
Dell B1160W manual Wep