User's Guide
Page 29
... uninstall and then reinstall it. Click Next. Options include: • No security • Wireless Encryption Protocol (WEP) • WiFi Protected Access (WPA) • WiFi Protected Access 2 (WPA2-PSK) 8 Enter the appropriate wireless security key(s) or password, and then click Next. 9 Verify the wireless..., and follow the instructions on the network. Note: Repeat steps 3-11 on the host computer) 1 For more information, see the setup information that you are multiple printers, select the IP or MAC address. 7 Follow the instructions on the computer screen to complete the installation...
... uninstall and then reinstall it. Click Next. Options include: • No security • Wireless Encryption Protocol (WEP) • WiFi Protected Access (WPA) • WiFi Protected Access 2 (WPA2-PSK) 8 Enter the appropriate wireless security key(s) or password, and then click Next. 9 Verify the wireless..., and follow the instructions on the network. Note: Repeat steps 3-11 on the host computer) 1 For more information, see the setup information that you are multiple printers, select the IP or MAC address. 7 Follow the instructions on the computer screen to complete the installation...