Canon Maxify Mb5320 User Guide
Here you can view all the pages of manual Canon Maxify Mb5320 User Guide. The Canon manuals for Printer are available online for free. You can easily download all the documents as PDF.
Page 351
When the Printer Driver Is Not Associated with a PortIf No Driver is displayed for the printer's name on the Canon IJ Network Tool screen, the printer driver is not associated with a created port. To associate a port with a printer driver, follow the procedure below.1. Start up IJ Network Tool. 2. Select the printer displayed as No Driver on Name . 3. Select Associate Port... on the Settings menu. The Associate Port screen is displayed. 4. Select a printer to associate with a port. The list...
Page 352
About Technical TermsIn this section, technical terms used in the manual are explained. A B C D F I K L M O P R S T U W A • Access Point A wireless transceiver or base station that receives information from wireless clients/the machine and rebroadcasts it. Required in an infrastructure network. • Access point mode The machine is used as an access point to connect external wireless communication devices (e.g. computers, smartphones, or tablets) in an environment where no access point or wireless LAN...
Page 353
•Authentication Method The method that an access point uses to authenticate a printer through a wireless LAN. The methods are agreeable each other. When using WEP as an encryption method, the authentication method is able to fix to Open System or Shared Key . For WPA/WPA2, authentication method is PSK.◦ Auto The printer automatically changes its authentication method to match the access point. ◦ Open System In this authentication method, the communication partner is authenticated without using WEP key...
Page 354
F• Firewall It is a system that prevents an unlawful computer access in the network. To prevent, you can use the firewall function of a broadband router, the security software installed in the computer, or operation system for computer. I • IEEE 802.11b International standard for wireless LAN using the 2.4 GHz frequency range with a throughput of up to 11 Mbps. • IEEE 802.11g International standard for wireless LAN using the 2.4 GHz frequency range with a throughput of up to 54 Mbps. Compatible with...
Page 355
◦Hex Specify a 10-digit or 26-digit string that can contain hexadecimal (0 to 9, A to F, and a to f).• Key Length Length of the WEP key. Select either 64 bits or 128 bits. Longer key length allows you to set a more complex WEP key. L • Link Quality The status of connection between the access point and the printer excluding noise (interference) is indicated with a value from 0 to 100%. • LPR A platform-independent printing protocol used in TCP/IP networks. It is not supported bidirectional communication....
Page 356
S• Signal Strength The strength of the signal received by the printer from the access point is indicated with a value from 0 to 100%. • SSID Unique label for wireless LAN. It is often represented such as a network name or an access point name. SSID distinguishes one wireless LAN from another to prevent interference. The printer and all clients on a wireless LAN must use the same SSID in order to communicate with each other. The SSID can be up to 32 characters long, and is made up of alphanumeric...
Page 357
W• WCN (Windows Connect Now) Users running Windows Vista or later can obtain the setting information directly via wireless network (WCN-NET). • WEP/WEP Key An encryption method employed by IEEE 802.11. Shared security key used to encrypt and decrypt data sent over wireless networks. This printer supports key length of 64 bits or 128 bits, key format of ASCII code or Hexadecimal, and key number of 1 to 4. • Wi-Fi International association that certifies interoperability of wireless LAN products based on...
Page 358
•WPS (Wi-Fi Protected Setup) WPS is a standard for easy and secure establishment of a wireless network. There are 2 primary methods used in the Wi-Fi Protected Setup: PIN entry: a mandatory method of setup for all WPS certified devices Push button configuration (PBC): an actual push button on the hardware or through a simulated push button in the software. 358
Page 359
RestrictionsIf you use a printer over the wireless LAN, the printer may recognize nearby wireless systems, you should set a network key (WEP or WPA/WPA2) to the access point to encrypt wireless transmission. Wireless communication with a product that does not comply with the Wi-Fi standard cannot be guaranteed. Connecting with too many computers may affect the printer performance, such as printing speed.359
Page 360
About FirewallA firewall is a function of the security software installed in the computer or operation system for computer, and is a system that is designed to prevent unauthorized access to a network. Precautions When a Firewall Function is Enabled• A firewall function may limit communications between a printer and a computer. This may disableprinter setup and communications. • During the printer setup, you may be prompted to enable or disable communications, depending onthe firewall function of the...