User Manual
Page 199
... • Ad-hoc Client computer and machine setting where wireless communication occurs on a peer-topeer basis, i.e., all clients in the manual are explained. When using WEP as an encryption method, the authentication method is able to fix to match the access point. •... . A B C D F I K L M O P R S T U W A • Access Point A wireless transceiver or base station that an access point uses to network users. Strong cryptographic algorithm adopted within U.S. No access point is required. The methods are factory default, the admin password does not have to access the printer...
... • Ad-hoc Client computer and machine setting where wireless communication occurs on a peer-topeer basis, i.e., all clients in the manual are explained. When using WEP as an encryption method, the authentication method is able to fix to match the access point. •... . A B C D F I K L M O P R S T U W A • Access Point A wireless transceiver or base station that an access point uses to network users. Strong cryptographic algorithm adopted within U.S. No access point is required. The methods are factory default, the admin password does not have to access the printer...