Wireless (Enterprise)
- Overview
- This page allows you to configure wireless settings using IEEE 802.1x.
- Communication Mode
- There are two types of wireless networks: Infrastructure mode and Ad-hoc
- Infrastructure
- Infrastructure mode networks have a central access point, usually a wireless router, at the heart of the network. It is through this central access point that all print jobs are received by the Brother device.
- Wireless Network Name (SSID)
- The SSID (Service Set Identifier) specifies which wireless network to use.
- Channel
- Wireless Ethernet networks use channels. There are up to 13 channels that can be used. However, in many countries the number of channels available are restricted.
- Authentication Method and Encryption Mode
- Most wireless networks use some kind of security settings.
- These security settings define the authentication (how the device identifies itself to the network) and encryption (how the data is encrypted as it is sent on the network).
- If you do not correctly specify these options when you are configuring your wireless device, it will not be able to connect to the Wireless network.
- Therefore care must be taken when configuring these options.
- Please refer to the information below to see which authentication and encryption methods your wireless device supports by using IEEE 802.1x.
- Authentication Methods
- This device supports the following methods which use IEEE 802.1x:
- LEAP
- Cisco® LEAP (Light Extensible Authentication Protocol) uses user ID and password for authentication.
- EAP-FAST/PEAP/EAP-TTLS
- Cisco® EAP-FAST (Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling)/ PEAP (Protected Extensible Authentication Protocol) /EAP-TTLS (Extensible Authentication Protocol-Tunneled Transport Layer Security) uses a user ID and password for authentication.You can verify the server Certificate using the CA certificate.
- EAP-TLS
- EAP-TLS (Extensible Authentication Protocol-Transport Layer Security) uses a user ID and client certificate for authentication.
You can also verify the SSL server certificate by using the CA certificate. - Inner Authentication Methods
- You need to specify one of the inner authentication methods according to the one you selected.
This device supports the following inner authentication methods:
- NONE
- MS-CHAPv2
- GTC
- MS-CHAP
- CHAP
- PAP - NONE
- MS-CHAPv2 is used for Provisioning, and the method for EAP-FAST corresponding to second phase authentication method.
- MS-CHAPv2
- MS-CHAPv2(Microsoft-Challenge Handshake Authentication Protocol version 2) is an internal authentication method for EAP-FAST/PEAP/EAP-TTLS.
- GTC
- GTC(Generic Token Card) is an internal authentication method for EAP-FAST/PEAP.
- MS-CHAP
- MS-CHAP(Microsoft-Challenge Handshake Authentication Protocol) is an internal authentication method for EAP-TTLS.
- CHAP
- CHAP(Challenge Handshake Authentication Protocol) is an internal authentication method for EAP-TTLS.
- PAP
- PAP(Password Authentication Protocol) is an internal authentication method for EAP-TTLS.
- Encryption Methods
- Encryption is used to secure the data itself. This device supports the following Methods:
- TKIP
- TKIP (Temporal Key Integrity Protocol) removes the predictability that intruders could rely upon to exploit security weaknesses brought about with the use of manually assigned WEP keys.
TKIP keys are automatically generated and are longer that WEP keys - AES
- AES (Advanced Encryption Standard) is Wi-Fi® authorized strong encryption standard.
- CKIP
- The original Key Integrity Protocol for LEAP by Cisco Systems, Inc.
- User ID
- Enter the user ID for IEEE 802.1x authentication.
- Password
- Enter the Password for IEEE 802.1x authentication.(You do not have to enter the password when you use EAP-TLS.)
- Client Certificate
- Select the client certificate for EAP-TLS authentication.
In order to select the client certificate, you need to set it in the "Configure Certificate" page beforehand. (You do not have to select the client certificate when you use an authentication method except for EAP-TLS.) - Server Certificate Verification
- Select the server certificate verification method.
(You do not have to select the verification method when you use LEAP.) - No Verification
- The server certificate is trusted without verification.
- CA Cert.
- The server certificate issued by the CA is verified by the CA certificate installed in this device.
In order to use a CA certificate, you need to set it in the "Configure Certificate" page beforehand. - CA Cert. + ServerID
- The Server Certificate (issued by the CA using the CA Certificate installed in this machine) and Common Name (Server ID) are verified. Please note that you must set the CA Certificate on the "Configure Certificate" page beforehand.
- Server ID
- Input the server ID for the server certificate verification.
The server ID is the common name of the server certificate. - Certificate
- If you use Client Certificate or CA Certificate, you need to set the CA Certificate on "Certificate" page beforehand.
