Monarch 7411 Operating Instructions Manual page 81

802.11b/g wired/wireless print server for use with monarch 9825 printers
Hide thumbs Also See for 7411:
Table of Contents

Advertisement

SSID or
Service Set
Identifier
Static
Method
Subnet
Subnet Mask
Telnet
TCP/IP
TKIP (Temporal Key
Integrity Protocol)
TLS (Transport
Layer Security)
TTLS (Tunneled
Transport Layer
Security)
Transmit Rate
A unique identifier that must match for all nodes on a
subnetwork to communicate with each other. It consists of
up to 32 characters (any printable character, including
spaces). If using the space character, it must be enclosed
in quotation marks. It is case-sensitive.
One of the available boot methods. Use static if your
network uses fixed configuration. The IP address remains
the same every time the device connects to the network.
A portion of a network that shares a common address
component. On TCP/IP networks, subnets are all devices
with the same prefix. For example, all devices that start
with 192.192.192 are part of the same subnet. Dividing a
network into subnets is useful for both security and
performance reasons.
A mask is used to determine what subnet an IP address
belongs to. Companies often have ranges of IP addresses
that can be described by one or more masks. For example,
a mask of 255.255.255.0 allows variation in the last
position only, because the first three positions are fixed.
A Terminal Emulation program for TCP/IP networks that
runs on your computer and connects your PC to a server on
the network. You enter commands through the Telnet
program and they run as if you were entering them directly
on the server console.
A way that two devices can transmit data between each
other. TCP/IP (Transmission Control Protocol/ Internet
Protocol) is generally the standard for transmitting data
over a network.
Changes the encryption keys regularly and has time limits
before new keys are created. Changing the key
periodically provides additional security.
A cryptographic protocol that uses client-side and server-
side certificates to authenticate users on the Web. It can
dynamically create user-based and session-based keys.
Provides certificate-based, server-side, mutual
authentication of the client and network through an
encrypted channel (or tunnel). It can dynamically create
user-based and session-based keys.
See Speed.
Glossary G-5

Advertisement

Table of Contents
loading

Related Products for Monarch 7411

Table of Contents