Symbol Technologies WS 2000 Switch User Manual


 
WS 2000 Use Cases 9-25
Clarisa clicks the + to the left of the Printer WLAN menu item and selects the Printer Security item. In the screen that
displays, Clarisa selects no authentication. She enters the MAC numbers of the wireless printers in the Mobile Access
Control section. The MAC numbers are unique numbers assigned to every network-cable hardware device and are usually
listed on the same label that shows the device’s model number and serial number. She enters each by clicking on the Add
button and entering the MAC address in the Start MAC column of the new row.
She uses the Mobile Unit Access Control pull-down menu to select Deny. This specifies that the switch will deny access to
any mobile unit that has a MAC address that is not listed.
In the Encryption Methods section, she selects WEP 128 (104-bit key). WEP encryption is weak compared with WPA-TKIP,
but still requires a day or so of solid traffic samples and a fair amount of effort to break. There is no data transversing this
link that a data thief couldn’t find in the trash. In any case, the store’s wireless printers only support WEP.
She clicks the WEP Key Settings button and enters the keys she will use: