Brother QL-1110NWB Professional Label Printer

User Manual - Page 170

For QL-1110NWB.

PDF File Manual, 179 pages, Read Online | Download pdf file

QL-1110NWB photo
Loading ...
Loading ...
Loading ...
Network Terms and Information
161
22
Wireless Network Terms and Concepts 22
Security Terms 22
Authentication and encryption 22
Most wireless networks use some kind of security settings. These security settings define the authentication
(how the device identifies itself to the network) and encryption (how the data is encrypted as it is sent on the
network). If you do not correctly specify these options when you are configuring your Brother wireless
printer, it will not be able to connect to the wireless network. Make sure you configure these options
carefully.
Authentication and Encryption methods for a personal wireless network 22
A personal wireless network is a small network, for example using your Label Printer in a wireless network at
home, without IEEE 802.1x support.
To use your Label Printer in an IEEE 802.1x supported wireless network, see Authentication and Encryption
methods for an enterprise wireless network on page 162.
Authentication methods
22
Open system
Wireless devices are allowed to access the network without any authentication.
Shared key
A secret pre-determined key is shared by all devices that will access the wireless network.
The Brother wireless printer uses a WEP key as the pre-determined key.
WPA-PSK
Enables a Wi-Fi Protected Access Pre-shared key (WPA-PSK), which enables the Brother wireless printer
to associate with access points using TKIP for WPA-PSK.
WPA2-PSK
Enables a Wi-Fi Protected Access Pre-shared key (WPA2-PSK), which enables the Brother wireless
printer to associate with access points using AES for WPA2-PSK (WPA-Personal).
WPA/WPA2-PSK
Enables a Wireless Protected Access Pre-shared key (WPA-PSK/WPA2-PSK), which enables the Brother
wireless printer to associate with access points using TKIP for WPA-PSK or AES for WPA-PSK and
WPA2-PSK (WPA-Personal).
Encryption methods
22
None
No encryption method is used.
WEP
When using WEP (Wired Equivalent Privacy), the data is transmitted and received with a secure key.
Loading ...
Loading ...
Loading ...