background image

 

A-3

 

Signal St rength  

A percentage (1 to 100) o f the connection between  the device and access point.  If the signal 
strength is 0, there is no connection with the access point; 30 or less indicates you may be 
e xperiencing interference  or close to being out of access point range, and below 50, p rinting 
performance could be affected.  To impro ve the si gnal strength, try mo ving  the printer closer 
to the access point and awa y f rom other radio devi ces such as Bluetooth® wireless devices, 
microwa ve o vens, or   
2.4-GHz cordless phones. 

Speed or   
Transmit Rate  

Sets the ma ximum rate of  communication between the devices on the net wor k.  It is also 
called transmit rate.  The  speeds are in megabits per second ( Mbps) and include:  1, 2, 5.5, 
11, 12, 18, 24, 36, 48, an d 54. 

SSID o r  
Service Set 
Identifier 

A unique identifier that must match for all nodes on a subnetwork to commun icate with each 
other.  It consists of up to 32 characters (any printa ble character, including spaces).   
If using the space character, it must be enclosed in quotation marks.  It is case-sensitive. 

Static   
Method 

One of the a vailable boot methods.  Use static if your net work uses fi xed con figuration.  The 
IP address remains the same every time the devic e connects to the network .   

Subnet  

A portion of a net work tha t shares a common address component. On TCP/IP  net works, 
subnets are all devices wi th the same prefi x.  For e xample, all devices that start  with 
192.192.192 are part of t he same subnet.  Dividing a net work into subnets is useful for both 
security and performance reasons.  

Subnet Mask 

A mask is used to determine what  subnet an IP add ress belongs to. Companies often have 
ranges of IP addresses that can be described by one or more masks. For e xample, a mask of 
255.255.255.0 allows  vari ation in the last position only, because the first thre e positions are 
fi xed.   

Telnet 

A Te rminal Emulation program for TCP/I P net works  that runs on your comput er and connects 
your computer to a ser ver  on the net work.  You ente r commands through the Telnet program 
and they run as if  you  wer e entering them directly o n the server console.   

TCP/IP   

A  wa y that t wo de vices can transmit data between e ach other. TCP/IP  ( Trans mission Control 
Protocol/ Internet Protoco l) is generally the standar d for transmitting data over a net work.    

TKIP (Tempo ral 
Ke y Integri t y 
Protocol)  

Changes the encryption k eys regularly and has time limits before new ke ys are created.  
Changing the key periodi cally provides additional security.  

TLS (Transpo rt 
La yer Securi t y)  

A cryptographic protocol t hat uses client-side and server-side certificates to  authenticate 
users on the W eb.  It can dynamically create user-b ased and session-based keys.  

TTLS (Tunneled 
Transport La ye r 
Securit y)  

Provides certificate-base d, server-side, mutual aut hentication of the client and netwo rk 
through an encrypted cha nnel (or tunnel).  It can d ynamically create user-ba sed and 
session-based keys. 

Transmit Rate  

See 

Speed

.  

WEP or  
Wired 
Equiva lent  
Pri vac y 

 

A security protocol for  wir eless local area networks. W EP was designed to provide the same 
level of security as that of  a  wired net work,  which is inherently more secure t han a wi reless 
netwo rk because wired ne t works are easily protecte d against unauthorized  access. W ireless 
netwo rks use radio  waves  to communicate and can be vulnerable to unauthor ized users.    
W EP provides security by encrypting data o ver radi o wa ves so that it is prote cted as it is 
transmitted. Ho weve r, it h as been found that W EP is not as secure as once believed. 

Note :

  If one par t of a  wir eless network has W EP enabled, they all must have it enabled with 

the same key or they can not communicate. 

128 Bit / 64 Bit   
WEP Ke y 

This is the 64 or 128 bit  W EP key that must match other Nodes’ encryption  keys in order to 
communicate: 10 hex characters for 64 bit (40 user-specified characters), or 26 he x 
characters for 128 bit (104 user-specified characters).  You must use the same key values for 
devices to communicate with each other . 

WL AN o r 
Wireless  Local 
Area Netw ork  

A LAN that uses high-freq uency radio  wa ves to communicate between nodes,  rather than 
telephone wires, etc.  

WP A (Wi-F i 
Protected 
Access)  

A net work security p rotocol that uses improved authentication and temporal keys.  It  was 
created to address the we aknesses of W EP encrypt ion. 

WP A2   
(or IEE E 802.11i)  

A net work security p rotocol with st ronger encryptio n than W PA.  It  was created to address 
the  weaknesses of W EP encryption.  

Summary of Contents for ADTP1 MonarchNet2

Page 1: ...TCADTP1MN2OI Rev AA 7 15 2015 Avery Dennison Corp All rights reserved Monarch Products MONARCHNET2 OPERATING INSTRUCTIONS TABLETOP PRINTER 1 ...

Page 2: ...a retrieval system or translated into any language in any form by any means without the prior written permission of Avery Dennison Corp Trademarks Monarch and Monarch Net2 are trademarks of Avery Dennison Corp Microsoft Windows and NT are trademarks of Microsoft Corporation in the United States and or other countries Firefox is a trademark of Mozilla Corporation UNIX is a trademark of The Open Gro...

Page 3: ...tings 2 8 Basic Security Configurations 2 9 Using WEP 2 11 Configuring Certificates 2 12 Reset Initialize Network 2 13 Reading the Virtual Panel 2 13 Using Custom Commands 2 14 Changing the Password 2 15 CONSOLE COMMANDS 3 1 Conventions 3 1 Accessing Telnet Console Mode 3 1 Help Commands 3 2 General Commands 3 3 Setup Commands 3 4 RFID Commands 3 7 802 11b g Wireless Commands 3 7 TCP IP Commands 3...

Page 4: ......

Page 5: ...eless enabled computer printing straight to the printer Ad Hoc mode An 802 11a b g n wireless access point allowing wireless and wired Ethernet enabled computers to print to the wireless module infrastructure mode To configure and print you need the following 1 The MAC address from the label of the wireless module for example 004017023F96 2 The following information from your wireless network admi...

Page 6: ...cond Channels 1 to 11 Mode Ad Hoc or infrastructure Encryption WEP 64 or WEP 128 WPA or WPA2 Authentication EAP FAST LEAP PEAP TLS TTLS PSK Verifying a Wireless Connection When the printer is turned on the wireless module runs through a set of power up diagnostics for a few seconds Then the display shows the wireless connection icon wireless connection signal strength and your printer s IP Interne...

Page 7: ...rinter to connect to an access point When the printer is connected and ready to receive data you see The printer s display shows the antenna symbol when the printer is connected and ready to receive data Logging In 1 Start your Web browser 2 Type in your printer s IP address and press Enter For example 192 0 0 192 If the printer is experiencing a ribbon or supply problem the icon for Printer Statu...

Page 8: ...ser name The password is case sensitive and saved in the printer s flash memory See Changing the Password to change the password The About tab appears with information about your printer including printer name IP address installed enabled options and more Click the Tech Support tab if you need to contact us ...

Page 9: ...Adjust Position The range is 300 to 300 This adjusts where the tag is cut 5 Enter a value for the Supply Position The range is 300 to 300 This adjusts the printer to print at the vertical 0 0 point Only adjust on initial printer setup 6 Set the Batch Separators No Yes or Long 7 Set the Skip Index mode No or Yes Skip index allows you to print an image over multiple labels 8 Set the Backfeed Off On ...

Page 10: ...age Enabled or Disabled Flash storage allows packets with R or N selectors to be stored in Flash Memory instead of volatile RAM Packets stored in flash memory are saved when the printer is turned off 2 Set the Speed Adjustment Default 2 5 4 0 6 0 8 0 10 0 or 12 0 ips If you select Default serial bar codes print at 2 5 ips parallel bar codes print at 6 0 ips 3 Set the Power Up Mode Online or Offlin...

Page 11: ...10 The default is 3 If you are having a problem receiving an IP address with BOOTP set this number to 10 3 Change the IP Address if necessary 4 Set or change the Subnet Mask 5 Set or change the Gateway 6 Select either No Subnet or No Gateway for RARP 7 Select Automatic DNS Settings to automatically configure the domain name settings 8 Enter the Domain Name 9 Enter the Primary DNS Server s IP addre...

Page 12: ... Window 10240 is the default 15 Set the TCP Port Port 9100 is the default 16 Set the TCP Timeout in minutes The default is 0 which is no timeout 17 Set the Keepalive Timer in minutes The default is 1 minute 18 Enable or Disable IP Receive CheckSum and Probe Idle Connections 19 Select Retry Enable for LPD LPR 20 Select Enable Web Authorization Timeout to make the Web pages time out after five 5 min...

Page 13: ...erify the Trap Community Name and change if necessary 8 Enter the Trap IP Address if it does not automatically appear 9 Enter the Trap IP Port if it does not automatically appear 10 Enable SNMP Alerts if necessary Set which alerts you need to receive See Setting Alerts for more information 11 Click Submit when you are finished 12 Click the Protocols tab 13 Click Save Re init Network on the Protoco...

Page 14: ...gnal strength gets below this value the printer connects to another access point in range with better signal strength This prevents excessive roaming between access points if the printer is located near two access points 6 Set the Encryption Mode Disable 64 BIT Encryption 128 BIT Encryption WPA WPA2 WPA2 WPA and DYNAMIC WEP The encryption mode determines the algorithm used to encrypt messages 7 Se...

Page 15: ... Method Type Algorithm Size bits Description WEP RC4 64 128 This is the 64 or 128 bit WEP Key that must match other nodes encryption keys in order to communicate The user can only define 10 hex characters 40 bits for 64 bit WEP or 26 characters 104 bits for 128 bit WEP WPA RC4 64 128 Improves on WEP by using TKIP Temporal Key Integrity Protocol which dynamically changes the encryption key and MIC ...

Page 16: ...ile You can either download that file from the wireless module and add it to the TLS authentication server or overwrite a new one on the wireless module PAC EAP FAST does not use certificates to authenticate but a PAC Protected Access Credential which is managed dynamically by the server The PAC is distributed one at a time to the client manually or automatically See the following table of accepta...

Page 17: ...her on the network Note As you enter the values for the WEP keys you can see the characters However the next time you view this tab the values are displayed as asterisks 3 Click Submit when finished 4 Click the Protocols tab 5 Click Save Re init Network on the Protocols tab before any changes take affect Even though you submitted your changes on the previous screen they do not take affect until yo...

Page 18: ...ovided by the authentication server Leaving this field blank sets the value to null The Certificate Root Key Exponent value must match the authentication server certificate value 3 Enter the Certificate Common Name 1 which is the name of the certificate on the primary authentication server Note If both common names are left blank the values are set to null and all host certificates are accepted 4 ...

Page 19: ... few minutes for the printer to respond with the new settings Reading the Virtual Panel The virtual panel operates just like the printer s control panel You can use the virtual panel to clear errors feed labels and more 1 From the side Menu Bar click Virtual Panel Display 2 The current status of the printer appears on the virtual panel s display 3 If there is an error click Escape Clear to clear t...

Page 20: ...nd batch data to print a label or enter Telnet console commands 1 From the side Menu Bar click Custom Command 2 Enter any MCPL format and batch data or enter a Telnet console command See Chapter 3 Console Commands for more information 3 Click Submit The MPCL format is sent or results from a Telnet console command appear ...

Page 21: ...u change it Changing the password also restricts access to Telnet sessions 1 From the side Menu Bar click Access Control 2 Enter the Current Password 3 Enter the New Password 4 Retype the New Password to confirm it 5 Press Submit when finished If you change the password and attempt to log in using the old password this message appears It also appears for various error conditions when configuring t...

Page 22: ...2 16 MonarchNet2 Operating Instructions ...

Page 23: ...of each keyword instead of the whole keyword Some keywords require more capitalized letters than others For example SEt KEYVAL RAdio options Mutually exclusive options are included within square brackets and separated by a forward slash Select only ONE of the options For example DISable STRICT FLEXible values Values are included within brackets Values that contain spaces multiple words must be enc...

Page 24: ...100 6 To change the SSID type set en ssidtestsystemthenpress Enter 7 To set the IP address type set ipad 192 0 0 192then pressEnter 8 To set the subnet mask type set ipsub 255 255 0 0then pressEnter 9 Type INIT and press Enter to save the settings and initialize the unit 10 Type EXIT to exit Telnet See the following sections for a list of the most frequently used commands Help Commands For help at...

Page 25: ...bnet aa bb cc dd Subnet mask TCP EN DIS Raw TCP 9100 protocol TELnet EN DIS TELNET protocol TFTP EN DIS TFTP protocol TImeout n Inactivity timeout minutes TRAP n ADDR PORT TRIG TRAP configuration WIndownn LPD TCP maximum window size Displays a list of the available help commands for Set IP General Commands From the list of commands the brackets indicate to pick one of the options listed the items ...

Page 26: ...ue Sets the specified backfeedcontrol parameter to the specified value SHow PRN BACkfeedcontrol ACtion DISPenseposition DISTance Shows the specified backfeedcontrol parameter s current setting If no parameter is specified it shows the current settings of all parameters in the backfeedcontrol category SET PRN BATchoptions CLearfields NUmberofparts CUTOption CUTMultiple PRintmultiple QUantity PRompt...

Page 27: ...mmand character disables immediate commands Clearing the ENQ status request character disables ENQ status polling SHow PRN INFo MOdel SErial FIrmversion BOotversion COntrastpot PIcversion KNifeversion RFidversion NEtworkversion TOtals Shows the specified info parameter If no parameter is specified it shows all parameters in the info category SET PRN MEMoryconfig DOwnloadablefonts FORmat IMage REce...

Page 28: ...s of all parameter s in the supply category SHow PRN SUPplySYncsupply Resynchronizes the supply SET PRN SYStem POwerupmode LAnguage BAtchseparators SLashedzero SYmbolset value Sets the specified system parameter to the specified value SHow PRN SYStem POwerupmode LAnguage BAtchseparators SLashedzero SYmbolset Shows the specified system parameter s current setting If no parameter is specified it sho...

Page 29: ...b Browser for more information SET EN INAP PAP MSCHAP_V2 Sets the EAP inner authentication protocol SET EN KEY 1 2 3 4 Sets which WEP key number to use default is 1 SET EN KEYVAL WEPkey Sets WEP key value Must be hexadecimal SET EN MODE IN AD Sets 802 11b g n wireless mode to infrastructure or Ad Hoc mode SET EN ROAm Sets the Roam Threshold SET EN SSID ssid Sets 802 11b g n wireless SSID Use quote...

Page 30: ...lled Printer console commands are available but network console commands are not Syntax N number action device name C con_cmds N1 N Network Console Packet N2 number Number from 0 999 to identify the network console packet N3 action Enter A to add to packet to the printer N4 device Enter T to pass the packet through the printer and stores the packet in the network card N5 name Packet name 0 8 chara...

Page 31: ...ess The value for each segment must be less than 255 in these addresses Printer does not communicate with access point If you have reset network or wireless settings allow time for the printer to reset and connect to an access point This may take a minute or more depending on network traffic The printer does not communicate with your network The network settings must match the printer s settings f...

Page 32: ...ferent subnets turn off the printer and then turn it back on to reinitialize the wireless module 3 Verify the wireless module is functioning There is a wireless icon indicator on the printer s display 4 Print an MN2 test label Use four inch supply If you are using supply that is shorter than four inches long temporarily change your supply type to continuous to print the entire test label After pri...

Page 33: ...aracters You will see A which means the printer is online and waiting Alternatively you can type J 2 Note The J must be capital The printer responds with J 0 0 No response means that the printer may have an open session to some other connection Either terminate the other connection or turn off the printer and turn it back on Troubleshooting Wireless Configuration Problems 1 Your computer s wireles...

Page 34: ...4 4 MonarchNet2 Operating Instructions ...

Page 35: ... All devices must be on the same channel to communicate in Ad Hoc mode Other radio devices such as Bluetooth wireless devices microwave ovens or 2 4 GHz cordless phones may operate interfere if they are on the same channel as your network DHCP or Dynamic Host Configuration Protocol One of the available boot methods It is a protocol that issues IP addresses automatically within a specified range to...

Page 36: ... needed filename or directory This is a combination of path and filename PEAP Protected Extensible Authentication Protocol Authenticates clients into a network using only server side certificates which makes implementing and administering a wireless LAN easier Ping A way to determine if a device is accessible It sends a packet to the specified address and waits for a reply Protocol This is the way...

Page 37: ...hat two devices can transmit data between each other TCP IP Transmission Control Protocol Internet Protocol is generally the standard for transmitting data over a network TKIP Temporal Key Integrity Protocol Changes the encryption keys regularly and has time limits before new keys are created Changing the key periodically provides additional security TLS Transport Layer Security A cryptographic pr...

Page 38: ......

Page 39: ......

Page 40: ...Avery Dennison Printer Systems Division 170 Monarch Lane Miamisburg OH 45342 Printer Documentation http rbis averydennison com ADTP1 US CA ...

Reviews: