Dell B1160 User Manual page 89

Document
Hide thumbs Also See for B1160:
Table of Contents

Advertisement

Wireless network setup
7
After searching, the window shows the wireless network devices. Select
the name (SSID) of the access point you are using and click Next.
If you cannot find the network name you want to choose, or if you want to
set the wireless configuration manually, click Advanced Setting.
• Enter the wireless Network Name: Enter the SSID of access point you
want (SSID is case-sensitive).
• Operation Mode: Select Infrastructure.
• Authentication: Select an authentication type.
Open System: Authentication is not used, and encryption may or may
not be used, depending on the need for data security.
Shared Key: Authentication is used. A device that has a proper WEP key
can access the network.
WPA Personal or WPA2 Personal: Select this option to authenticate the
print server based on WPA Pre-Shared Key. This uses a shared secret key
(generally called Pre- Shared Key pass phrase) which is manually
configured on the access point and each of its clients.
• Encryption: Select the encryption (None, WEP64, WEP128, TKIP, AES,
TKIP AES).
• Network Key: Enter the encryption network key value.
• Confirm Network Key: Confirm the encryption network key value.
• WEP Key Index: If you are using WEP Encryption, select the appropriate
WEP Key Index.
The wireless network security window appears when the access point has
security settings.
The wireless network security window appears. The window may differ
according to its security mode: WEP, or WPA.
• WEP
Select Open System or Shared Key for the authentication and enter the
WEP security key. Click Next.
WEP (Wired Equivalent Privacy) is a security protocol preventing
unauthorized access to your wireless network. WEP encrypts the data
portion of each packet exchanged on a wireless network using a 64-bit
or 128-bit WEP encryption key.
• WPA
Enter the WPA shared key and click Next.
WPA authorizes and identifies users based on a secret key that changes
automatically at regular intervals. WPA also uses TKIP (Temporal Key
Integrity Protocol) and AES (Advanced Encryption Standard) for data
encryption.
2. Using a Network-Connected Machine (B1160w only)
89

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

B1160w

Table of Contents