beautypg.com

Wireless network terms and concepts, Security terms – Brother QL-810W Ultra-Fast Label Printer with Wireless Networking User Manual

Page 202

background image

Network Terms and Information

192

20

Wireless Network Terms and Concepts

20

Security Terms

20

Authentication and encryption

20

Most wireless networks use some kind of security settings. These security settings define the authentication
(how the device identifies itself to the network) and encryption (how the data is encrypted as it is sent on the
network).

If you do not correctly specify these options when you are configuring your Brother wireless

printer, it will not be able to connect to the wireless network.

Make sure you configure these options

carefully.

Authentication and Encryption methods for a personal wireless network

20

A personal wireless network is a small network, for example using your Label Printer in a wireless network at
home, without IEEE 802.1x support.
To use your Label Printer in an IEEE 802.1x supported wireless network, see

Authentication and Encryption

methods for an enterprise wireless network

on page 193.

Authentication methods

20

Open system
Wireless devices are allowed to access the network without any authentication.

Shared key
A secret pre-determined key is shared by all devices that will access the wireless network.
The Brother wireless printer uses a WEP key as the pre-determined key.

WPA-PSK
Enables a Wi-Fi Protected Access Pre-shared key (WPA-PSK), which enables the Brother wireless printer
to associate with access points using TKIP for WPA-PSK.

WPA2-PSK
Enables a Wi-Fi Protected Access Pre-shared key (WPA2-PSK), which enables the Brother wireless
printer to associate with access points using AES for WPA2-PSK (WPA-Personal).

WPA/WPA2-PSK
Enables a Wireless Protected Access Pre-shared key (WPA-PSK/WPA2-PSK), which enables the Brother
wireless printer to associate with access points using TKIP for WPA-PSK or AES for WPA-PSK and
WPA2-PSK (WPA-Personal).

Encryption methods

20

None
No encryption method is used.

WEP
When using WEP (Wired Equivalent Privacy), the data is transmitted and received with a secure key.