Wireless (Enterprise)
Overview
This page allows you to configure wireless settings using IEEE 802.1x.
Communication Mode
There are two types of wireless networks: Infrastructure mode and Ad-hoc
Infrastructure
Infrastructure mode networks have a central access point, usually a wireless router, at the heart of the network. It is through this central access point that all print jobs are received by the Brother device.
Wireless Network Name (SSID)
The SSID (Service Set Identifier) specifies which wireless network to use.
Channel
Wireless Ethernet networks use channels. There are up to 13 channels that can be used. However, in many countries the number of channels available are restricted.
Authentication Method and Encryption Mode
Most wireless networks use some kind of security settings.
These security settings define the authentication (how the device identifies itself to the network) and encryption (how the data is encrypted as it is sent on the network).
If you do not correctly specify these options when you are configuring your wireless device, it will not be able to connect to the Wireless network.
Therefore care must be taken when configuring these options.
Please refer to the information below to see which authentication and encryption methods your wireless device supports by using IEEE 802.1x.
Authentication Methods
This device supports the following methods which use IEEE 802.1x:
LEAP
Cisco® LEAP (Light Extensible Authentication Protocol) uses user ID and password for authentication.
EAP-FAST/PEAP/EAP-TTLS
Cisco® EAP-FAST (Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling)/ PEAP (Protected Extensible Authentication Protocol) /EAP-TTLS (Extensible Authentication Protocol-Tunneled Transport Layer Security) uses a user ID and password for authentication.You can verify the server Certificate using the CA certificate.
EAP-TLS
EAP-TLS (Extensible Authentication Protocol-Transport Layer Security) uses a user ID and client certificate for authentication.
You can also verify the SSL server certificate by using the CA certificate.
Inner Authentication Methods
You need to specify one of the inner authentication methods according to the one you selected.
This device supports the following inner authentication methods:
- NONE
- MS-CHAPv2
- GTC
- MS-CHAP
- CHAP
- PAP
NONE
MS-CHAPv2 is used for Provisioning, and the method for EAP-FAST corresponding to second phase authentication method.
MS-CHAPv2
MS-CHAPv2(Microsoft-Challenge Handshake Authentication Protocol version 2) is an internal authentication method for EAP-FAST/PEAP/EAP-TTLS.
GTC
GTC(Generic Token Card) is an internal authentication method for EAP-FAST/PEAP.
MS-CHAP
MS-CHAP(Microsoft-Challenge Handshake Authentication Protocol) is an internal authentication method for EAP-TTLS.
CHAP
CHAP(Challenge Handshake Authentication Protocol) is an internal authentication method for EAP-TTLS.
PAP
PAP(Password Authentication Protocol) is an internal authentication method for EAP-TTLS.
Encryption Methods
Encryption is used to secure the data itself. This device supports the following Methods:
TKIP
TKIP (Temporal Key Integrity Protocol) removes the predictability that intruders could rely upon to exploit security weaknesses brought about with the use of manually assigned WEP keys.
TKIP keys are automatically generated and are longer that WEP keys
AES
AES (Advanced Encryption Standard) is Wi-Fi® authorized strong encryption standard.
CKIP
The original Key Integrity Protocol for LEAP by Cisco Systems, Inc.
User ID
Enter the user ID for IEEE 802.1x authentication.
Password
Enter the Password for IEEE 802.1x authentication.(You do not have to enter the password when you use EAP-TLS.)
Client Certificate
Select the client certificate for EAP-TLS authentication.
In order to select the client certificate, you need to set it in the "Configure Certificate" page beforehand. (You do not have to select the client certificate when you use an authentication method except for EAP-TLS.)
Server Certificate Verification
Select the server certificate verification method.
(You do not have to select the verification method when you use LEAP.)
No Verification
The server certificate is trusted without verification.
CA Cert.
The server certificate issued by the CA is verified by the CA certificate installed in this device.
In order to use a CA certificate, you need to set it in the "Configure Certificate" page beforehand.
CA Cert. + ServerID
The Server Certificate (issued by the CA using the CA Certificate installed in this machine) and Common Name (Server ID) are verified. Please note that you must set the CA Certificate on the "Configure Certificate" page beforehand.
Server ID
Input the server ID for the server certificate verification.
The server ID is the common name of the server certificate.
Certificate
If you use Client Certificate or CA Certificate, you need to set the CA Certificate on "Certificate" page beforehand.