HP 1022n HP LaserJet 1022nw - Wireless User Guide - Page 11

Authentication, Network name SSID, Encryption, embedded Web server online help. - 1022nw wireless setup

Page 11 highlights

NOTE NOTE More advanced levels of security (such as Wi-Fi protected access [WPA] and Pre-shared key) are available through the printer's embedded Web server. For introductory information about the embedded Web server, see Embedded Web server. For detailed information about using the features, see the embedded Web server online help. It is highly recommended that you implement a wireless security scheme (either WEP or WPA) prior to setup. In addition, use an antivirus program to protect against computer viruses, and follow basic security rules such as setting strong passwords and not opening unknown attachments. Other network components, including firewalls, intrusion-detection systems, and segmented networks, should also be considered as part of your network design. Authentication and encryption are two different approaches to network security. Authentication verifies the identity of a user or device before granting access to the network, making it more difficult for unauthorized users to access network resources. Encryption encodes the data being sent across the network, making the data unintelligible to unauthorized users. Both of these security methods are common on wireless networks. Authentication The HP installation software supports Open System authentication. More advanced forms of authentication are available through the embedded Web server. A network with Open System authentication does not screen network users based on their identities and usually involves supplying the correct SSID. Such a network might use Wired Equivalent Privacy (WEP) encryption to provide a first level of security, or Wi-Fi protected access (WPA) to provide security by encrypting data sent over radio waves from one wireless device to another wireless device. The HP LaserJet 1022nw wireless printer allows for either WEP or WPA. Shared key and server-based authentication protocols are implemented through the embedded Web server. For introductory information about the embedded Web server, see Embedded Web server. For detailed information about using the features, see the embedded Web server online help. Network name (SSID) Wireless devices are configured with the name of the network to which they will connect. The network name is also called the SSID and identifies the ESS (Extended Service Set) that is normally associated with larger infrastructure networks. The SSID should not be considered a security feature because it can be easily identified. However, as a network administration or management feature, it does provide basic network access control. Encryption To reduce your network exposure to eavesdropping, establish a wireless security key for your network. The printer installation software supports the WEP security scheme, which hinders unauthorized users from accessing data transmitted over the radio waves. It is based on the use of a single WEP key, in which case each computer or device is configured with the same key to communicate on that network. ENWW Wireless networking basics 5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58

More advanced levels of security (such as Wi-Fi protected access [WPA] and Pre-shared
key) are available through the printer’s embedded Web server. For introductory information
about the embedded Web server, see
Embedded
Web
server
. For detailed information
about using the features, see the embedded Web server online help.
NOTE
It is highly recommended that you implement a wireless security scheme (either WEP or
WPA) prior to setup. In addition, use an antivirus program to protect against computer
viruses, and follow basic security rules such as setting strong passwords and not opening
unknown attachments. Other network components, including firewalls, intrusion-detection
systems, and segmented networks, should also be considered as part of your network design.
Authentication and encryption are two different approaches to network security.
Authentication verifies the identity of a user or device before granting access to the network,
making it more difficult for unauthorized users to access network resources. Encryption
encodes the data being sent across the network, making the data unintelligible to
unauthorized users. Both of these security methods are common on wireless networks.
Authentication
The HP installation software supports Open System authentication. More advanced forms of
authentication are available through the embedded Web server.
A network with Open System authentication does not screen network users based on their
identities and usually involves supplying the correct SSID. Such a network might use Wired
Equivalent Privacy (WEP) encryption to provide a first level of security, or Wi-Fi protected
access (WPA) to provide security by encrypting data sent over radio waves from one
wireless device to another wireless device. The HP LaserJet 1022nw wireless printer allows
for either WEP or WPA.
NOTE
Shared key and server-based authentication protocols are implemented through the
embedded Web server. For introductory information about the embedded Web server, see
Embedded
Web
server
. For detailed information about using the features, see the
embedded Web server online help.
Network name (SSID)
Wireless devices are configured with the name of the network to which they will connect.
The network name is also called the SSID and identifies the ESS (Extended Service Set)
that is normally associated with larger infrastructure networks.
The SSID should not be considered a security feature because it can be easily identified.
However, as a network administration or management feature, it does provide basic network
access control.
Encryption
To reduce your network exposure to eavesdropping, establish a wireless security key for
your network. The printer installation software supports the WEP security scheme, which
hinders unauthorized users from accessing data transmitted over the radio waves. It is
based on the use of a single WEP key, in which case each computer or device is configured
with the same key to communicate on that network.
ENWW
Wireless networking basics
5