Wireless Network Terms And Concepts; Security Terms - Brother RJ-3050 User Manual

Hide thumbs Also See for RJ-3050:
Table of Contents

Advertisement

Appendix B

Wireless Network Terms and Concepts

Security Terms

Authentication and encryption
Most wireless networks use some kind of security settings. These security settings define the authentication
(how the device identifies itself to the network) and encryption (how the data is encrypted as it is sent on the
network). If you do not correctly specify these options when you are configuring your Brother wireless
printer, it will not be able to connect to the wireless network. Therefore, care must be taken when
configuring these options.
Authentication and Encryption methods for a personal wireless network
A personal wireless network is a small network, for example using your printer in a wireless network at home,
without IEEE 802.1x support.
If you want to use your printer in an IEEE 802.1x supported wireless network, see Authentication and
Encryption methods for an enterprise wireless network on page 182.
Authentication methods
Open system
Wireless devices are allowed to access the network without any authentication.
Shared key
A secret pre-determined key is shared by all devices that will access the wireless network.
The Brother wireless printer uses a WEP key as the pre-determined key.
WPA-PSK
Enables a Wi-Fi Protected Access Pre-shared key (WPA-PSK), which enables the Brother wireless printer
to associate with access points using TKIP for WPA-PSK.
WPA2-PSK
Enables a Wi-Fi Protected Access Pre-shared key (WPA2-PSK), which enables the Brother wireless
printer to associate with access points using AES for WPA2-PSK (WPA-Personal).
WPA/WPA2-PSK
Enables a Wireless Protected Access Pre-shared key (WPA-PSK/WPA2-PSK), which enables the Brother
wireless printer to associate with access points using TKIP for WPA-PSK or AES for WPA-PSK and
WPA2-PSK (WPA-Personal).
Encryption methods
None
No encryption method is used.
WEP
When using WEP (Wired Equivalent Privacy), the data is transmitted and received with a secure key.
20
20
20
20
20
20
20
180

Hide quick links:

Advertisement

Table of Contents

Troubleshooting

loading

This manual is also suitable for:

Rj-3150

Table of Contents