|
|
Authentication Method and Encryption Mode
|
|
|
|
Most Wireless networks use some kind of security settings. These security settings define the authentication (how the device identifies itself to the network) and encryption (how the data is encrypted as it is sent on the network). If you do not correctly specify these options when you are configuring your wireless printer/multifunction device, it will not be able to connect to the Wireless network. Therefore care must be taken when configuring these options. Please refer to the information below to see which authentication and encryption methods your wireless printer/multifunction device supports.
|
|
|
Authentication Methods
|
|
-
Open System
Wireless devices are allowed access to the network without any authentication.
-
Shared Key (Infrastructure mode only)
A secret pre-determined key is shared by all devices that will access the wireless network.
-
WPA/WPA2-PSK
A secret pre-determined passphrase is shared by all devices that will access the wireless network. This authentication method enables you to communicate securely using a powerful encryption method. WPA/WPA2-PSK can only be used in a wireless infrastructure network.
-
LEAP (Not available for some models)
CiscoŽ LEAP (Light Extensible Authentication Protocol) uses user ID and password for authentication.
-
EAP-FAST/PEAP/EAP-TTLS (Not available for some models)
CiscoŽ EAP-FAST (Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling)/ PEAP (Protected Extensible Authentication Protocol) /EAP-TTLS (Extensible Authentication Protocol-Tunneled Transport Layer Security) uses user ID and password for authentication.You can verify the server Certificate using the CA certificate.
-
EAP-TLS (Not available for some models)
EAP-TLS (Extensible Authentication Protocol-Transport Layer Security) uses a user ID and client certificate for authentication. You can also verify the SSL server certificate by using the CA certificate.
|
|
Inner Authentication Methods (Not available for some models)
|
|
You need to specify one of the inner authentication methods according to the one you selected.
-
NONE
MS-CHAPv2 is used for Provisioning, and the method for EAP-FAST corresponding to second phase authentication method.
-
MS-CHAPv2
MS-CHAPv2(Microsoft-Challenge Handshake Authentication Protocol version 2) is an internal authentication method for EAP-FAST/PEAP/EAP-TTLS.
-
GTC
GTC(Generic Token Card) is an internal authentication method for EAP-FAST/PEAP.
-
MS-CHAP
MS-CHAP(Microsoft-Challenge Handshake Authentication Protocol) is an internal authentication method for EAP-TTLS.
-
CHAP
CHAP(Challenge Handshake Authentication Protocol) is an internal authentication method for EAP-TTLS.
-
PAP
PAP(Password Authentication Protocol) is an internal authentication method for EAP-TTLS.
|
|
Encryption Methods
|
|
- None
No encryption method is used.
- WEP (Wired Equivalent Privacy)
Data is transmitted and received with a secure key of the user's choice.
- TKIP
TKIP (Temporal Key Integrity Protocol) removes the predictability that intruders could rely upon to exploit security weaknesses brought about with the use of manually assigned WEP keys. TKIP keys are automatically generated and are longer that WEP keys.
- AES
AES (Advanced Encryption Standard) is Wi-FiŽ authorized strong encryption standard.
- CKIP
The original Key Integrity Protocol for LEAP by Cisco Systems, Inc.
|
|
|
|