Network key, Authentication methods – Brother HL 5450DN User Manual

Page 104

Advertising
background image

98

Wireless network terms and concepts (For HL-5470DW(T) and HL-6180DW(T))

10

Network key

10

Open system/Shared key with WEP
This key is a 64-bit or 128-bit value that must be entered in an ASCII or hexadecimal format.

• 64 (40) bit ASCII:

Uses 5 text characters. e.g. “WSLAN” (this is case sensitive)

• 64 (40) bit hexadecimal:

Uses 10 digits of hexadecimal data. e.g. “71f2234aba”

• 128 (104) bit ASCII:

Uses 13 text characters. e.g. “Wirelesscomms” (this is case sensitive)

• 128 (104) bit hexadecimal:

Uses 26 digits of hexadecimal data. e.g. “71f2234ab56cd709e5412aa2ba”

WPA-PSK/WPA2-PSK and TKIP or AES
Uses a Pre-Shared Key (PSK) that is 8 or more characters in length, up to a maximum of 63 characters.

Authentication and Encryption methods for an enterprise wireless network

10

An enterprise wireless network is a large network, for example using your machine in a business enterprise
wireless network, with IEEE 802.1x support. If you configure your machine in an IEEE 802.1x supported
wireless network, you can use the following authentication and encryption methods.

Authentication methods

10

LEAP
For LEAP, see LEAP (For wireless network) uu page 94.

EAP-FAST
For EAP-FAST, see EAP-FAST uu page 94.

PEAP
For PEAP, see PEAP uu page 94.

EAP-TTLS
For EAP-TTLS, see EAP-TTLS uu page 95.

EAP-TLS
For EAP-TLS, see EAP-TLS uu page 95.

Advertising
This manual is related to the following products: