Page 56 / 74 Scroll up to view Page 51 - 55
50
Appendix A:
Common Problems and Solutions
Wireless-G PrintServer
7.
To start over, I need to set the PrintServer to its factory default settings.
Unplug the PrintServer’s power adapter. Press the
Reset
button while you plug in the PrintServer’s power
adapter. Continue to hold the
Reset
button for 10 seconds and then release it. This will reset the password,
wireless, and other settings on the PrintServer to the factory defaults. In other words, the PrintServer will
revert to its original factory configuration.
8.
I need to upgrade the firmware.
In order to upgrade the firmware with the latest features, follow these steps:
1.
Go to the Linksys website at
and download the latest firmware for the
PrintServer. Then extract the firmware file on your PC.
2.
Open the PrintServer’s Web-based Utility. Click
Status
and then
Device
.
3.
Click the
Upgrade
button, and follow the on-screen instructions.
Downloaded from
www.Manualslib.com
manuals search engine
Page 57 / 74
51
Appendix B: Wireless Security
Security Precautions
Wireless-G PrintServer
Appendix B: Wireless Security
Linksys wants to make wireless networking as safe and easy for you as possible. The current generation of
Linksys products provide several network security features, but they require specific action on your part for
implementation. So, keep the following in mind whenever you are setting up or using your wireless network.
Security Precautions
The following is a complete list of security precautions to take:
1.
Change the default SSID.
2.
Disable SSID Broadcast.
3.
Change the default password for the Administrator account.
4.
Enable MAC Address Filtering.
5.
Change the SSID periodically.
6.
Use the highest encryption algorithm possible. Use WPA if it is available. Please note that this may reduce
your network performance.
7.
Change the WEP encryption keys periodically.
To ensure network security, at least steps one through five should be followed.
Security Threats Facing Wireless Networks
Wireless networks are easy to find. Hackers know that in order to join a wireless network, wireless networking
products first listen for “beacon messages”. These messages can be easily decrypted and contain much of the
network’s information, such as the network’s SSID (Service Set Identifier). Here are the steps you can take:
Change the administrator’s password regularly.
With every wireless networking device you use, keep in mind
that network settings (SSID, WEP keys, etc.) are stored in its firmware. Your network administrator is the only
person who can change network settings. If a hacker gets a hold of the administrator’s password, he, too, can
change those settings. So, make it harder for a hacker to get that information. Change the administrator’s
password regularly.
Note:
Some of these security features are
available only through the network router or
access point. Refer to the router or access
point’s documentation for more information.
Downloaded from
www.Manualslib.com
manuals search engine
Page 58 / 74
52
Appendix B: Wireless Security
Security Threats Facing Wireless Networks
Wireless-G PrintServer
SSID.
There are several things to keep in mind about the SSID:
1.
Disable Broadcast
2.
Make it unique
3.
Change it often
Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be
more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast
the SSID.
Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.)
Hackers know these defaults and can check these against your network. Change your SSID to something unique
and not something related to your company or the networking products you use.
Change your SSID regularly so that any hackers who have gained access to your wireless network will have to
start from the beginning in trying to break in.
MAC Addresses.
Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only
those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with
a random MAC Address.
WEP Encryption.
Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security
concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job
more difficult.
There are several ways that WEP can be maximized:
1.
Use the highest level of encryption possible
2.
Use “Shared Key” authentication
3.
Change your WEP key regularly
WPA.
Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. Two modes are
available: Pre-Shared Key and RADIUS. Pre-Shared Key gives you a choice of two encryption methods: TKIP
(Temporal Key Integrity Protocol), which utilizes a stronger encryption method and incorporates Message
Integrity Code (MIC) to provide protection against hackers, and AES (Advanced Encryption System), which utilizes
a symmetric 128-Bit block data encryption. RADIUS (Remote Authentication Dial-In User Service) utilizes a
RADIUS server for authentication and the use of dynamic TKIP, AES, or WEP.
Important:
Always remember that each
device in your wireless network MUST use
the same encryption method and encryption
key or your wireless network will not function
properly.
Downloaded from
www.Manualslib.com
manuals search engine
Page 59 / 74
53
Appendix B: Wireless Security
Security Threats Facing Wireless Networks
Wireless-G PrintServer
WPA Pre-Shared Key
. If you do not have a RADIUS server, select the type of algorithm, TKIP or AES, enter a
password in the Pre-Shared key field of 8-64 characters, and enter a Group Key Renewal period time between
0 and 99,999 seconds, which instructs the Router or other device how often it should change the encryption
keys.
WPA RADIUS
. WPA used in coordination with a RADIUS server. (This should only be used when a RADIUS
server is connected to the Router or other device.) First, select the type of WPA algorithm,
TKIP
or
AES
. Enter
the RADIUS server’s IP Address and port number, along with a key shared between the device and the server.
Last, enter a Group Key Renewal period, which instructs the device how often it should change the encryption
keys.
RADIUS
. WEP used in coordination with a RADIUS server. (This should only be used when a RADIUS server is
connected to the Router or other device.) First, enter the RADIUS server’s IP Address and port number, along
with a key shared between the device and the server. Then, select a WEP key and a level of WEP encryption,
and either generate a WEP key through the Passphrase or enter the WEP key manually.
Implementing encryption may have a negative impact on your network’s performance, but if you are transmitting
sensitive data over your network, encryption should be used.
These security recommendations should help keep your mind at ease while you are enjoying the most flexible
and convenient technology Linksys has to offer.
Downloaded from
www.Manualslib.com
manuals search engine
Page 60 / 74
54
Appendix C: About Bi-Directional Printing
Wireless-G PrintServer
Appendix C: About Bi-Directional Printing
Normal printing only sends print signals from a PC to a printer. Bi-directional printing, also called bitronic printing,
refers to a printer’s ability to do just the opposite—talk back to a PC to notify it of a print job status, paper jams, etc.
This two-way communication technology can be found in HP, IBM, Panasonic, and other laser or color printers where
close contact between the PC and printer is key. In color printing, for example, the printer “informs” the PC of its
constant status in order to mix color inks correctly for optimal quality output.
Bi-directional communication, communication from a printer to a PC, is normally handled by a combination of the
printer hardware and special software on your computer. Bi-directional printers generally have highly advanced
parallel interfaces. These printers often require special parallel ports in order to take full advantage of their features.
Using a bi-directional printer on a network poses unique challenges. Unlike a direct PC-to-printer connection during
which a bi-directional printer can easily send its signals back to the host PC through the computer’s parallel port
(which is normally located only a few feet away from the printer), a networked printer faces the problem of having to
route messages bound for a particular PC through a large array of hubs, switches, file servers, and computers.
Unfortunately, most printers are not equipped to handle the complexities of printer-to-PC communication across a
network. That does not mean that they can’t be used on a network, however.
Linksys designed the PrintServers to function with both regular as well as bi-directional printers. Standard print
servers cannot work with bi-directional printers, but the PrintServer features a custom design to support both parallel
as well as bi-directional parallel interfaces. However, the PrintServer cannot pass messages from the printer back to
the printing PC—this limitation is simply an industry standard, and not one of the PrintServer itself.
However, the PrintServer can check any printer’s online and printing status on the network using the Bi-Admin
management utility software packaged with the PrintServer. The status-checking feature built into the management
software does not require a bi-directional printer to function. If your printer came with special bi-directional software
allowing you to monitor printer status, do not use it with the PrintServer—the software is most likely not network-
capable. For best results, turn off the printer’s bi-directional function either by (1) removing any bi-directional printing
software from your network computers, and/or (2) turning off the printer’s bi-directional print feature inside of the
printer’s on-board menus (if it has menus). Your printer’s user guide should be able to provide specific instructions for
doing this.
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top