HP 3310 User Guide - Page 86

number, Not Applicable, Open System, Shared Key, WPA-PSK

Page 86 highlights

(continued) Parameter Channel Authentication type Description The channel number currently being used for wireless communication. This depends on the network in use, and might differ from the requested channel number. Value is from 1 to 14; countries/regions might limit the range of approved channels. ● (number): Value ranging from 1 to 14, depending on country/ region. ● None: No channel is in use. ● Not Applicable: The WLAN is disabled or this parameter does not apply to this network type. Note In ad hoc mode, if you are not able to receive or transmit data between your computer and the HP All-in-One, make sure that you are using the same communication channel on your computer and the HP All-in-One. In infrastructure mode, the channel is dictated by the access point. Type of authentication in use: ● None: No authentication in use. ● Open System (ad hoc and infrastructure): No authentication ● Shared Key (infrastructure only): WEP key is required. ● WPA-PSK (infrastructure only): WPA with Pre-Shared Key. ● Not applicable: This parameter does not apply to this network type. Authentication verifies the identity of a user or device before granting access to the network, making it more difficult for unauthorized users to access network resources. This security method is common on wireless networks. A network using Open System authentication does not screen network users based on their identities. Any wireless user can have access from the network. However, such a network might use WEP (Wired Equivalent Privacy) encryption to provide a first level of security against casual eavesdroppers. A network using Shared Key authentication provides increased security by requiring users or devices to identify themselves with a static key (a hexadecimal or alphanumeric string). Every user or device on the network shares the same key. WEP encryption is used along with shared key authentication, using the same key for both authentication and encryption. A network using server-based (WPA-PSK) authentication provides significantly stronger security, and is supported in most wireless access points and wireless routers. The access point or router verifies the identity of a user or device requesting access to the network before granting that access. Several different authentication protocols might be used on an authentication server. Network setup User Guide 83

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212

Parameter
Description
Channel
The channel number currently being used for wireless
communication. This depends on the network in use, and might
differ from the requested channel number. Value is from 1 to 14;
countries/regions might limit the range of approved channels.
(number)
: Value ranging from 1 to 14, depending on country/
region.
None
: No channel is in use.
Not Applicable
: The WLAN is disabled or this parameter
does not apply to this network type.
Note
In ad hoc mode, if you are not able to receive or transmit
data between your computer and the HP All-in-One, make sure
that you are using the same communication channel on your
computer and the HP All-in-One. In infrastructure mode, the
channel is dictated by the access point.
Authentication
type
Type of authentication in use:
None
: No authentication in use.
Open System
(ad hoc and infrastructure): No authentication
Shared Key
(infrastructure only): WEP key is required.
WPA-PSK
(infrastructure only): WPA with Pre-Shared Key.
Not applicable
: This parameter does not apply to this
network type.
Authentication verifies the identity of a user or device before
granting access to the network, making it more difficult for
unauthorized users to access network resources. This security
method is common on wireless networks.
A network using
Open System
authentication does not screen
network users based on their identities. Any wireless user can
have access from the network. However, such a network might
use WEP (Wired Equivalent Privacy) encryption to provide a first
level of security against casual eavesdroppers.
A network using
Shared Key
authentication provides increased
security by requiring users or devices to identify themselves with a
static key (a hexadecimal or alphanumeric string). Every user or
device on the network shares the same key. WEP encryption is
used along with shared key authentication, using the same key for
both authentication and encryption.
A network using server-based (
WPA-PSK
) authentication
provides significantly stronger security, and is supported in most
wireless access points and wireless routers. The access point or
router verifies the identity of a user or device requesting access to
the network before granting that access. Several different
authentication protocols might be used on an authentication server.
(continued)
User Guide
83
Network setup