HP 4200n HP Jetdirect Print Servers - Administrator Guide - Page 258

Authentication, Open System., Shared Key., EAP/802.1x, EAP/PSK, Encryption

Page 258 highlights

Authentication Authentication is used to validate the identification of each device or computer that is attempting to communicate. The authentication method used on a wireless network is decided during network design and is primarily based on network security requirements. Consequently, the authentication method is closely associated with encryption options also used on the network. The authentication methods supported by the HP Jetdirect wireless print servers include: Open System, Shared Key, EAP/802.1x, and EAP/PSK. Open System. Open System authentication is used when positive validation of a device's identity is not required for network access. If a device is configured for Open System authentication, then any other device or Access Point can authenticate with it. Open System authentication is the factory-default authentication method configured on HP Jetdirect wireless print servers. While Open System authentication virtually allows open access to a device, data security can still be implemented for the device using encryption. For more information, see Encryption. Note If the print server is configured with Open System authentication while the network requires EAP authentication, the Jetdirect configuration page will indicate a Ready status with an Authentication Failed message. Shared Key. Shared Key authentication is used when a standard level of validation for a device's identity is required before network access is permitted. Shared Key authentication requires that WEP security be implemented on all wireless network devices. In Shared Key authentication, a secret WEP key must be independently configured on each wireless device (that is, the same key is shared by the devices on the network). During the authentication process, a comparison is made between a transmitted challenge and an encrypted and decrypted response. An appropriate match must occur before access is allowed. For information on WEP keys, see WEP Security. ENWW HP Jetdirect 802.11b Wireless Print Servers 258

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302

ENWW
HP Jetdirect 802.11b Wireless Print Servers 258
Authentication
Authentication is used to validate the identification of each device
or computer that is attempting to communicate. The authentication
method used on a wireless network is decided during network
design and is primarily based on network security requirements.
Consequently, the authentication method is closely associated with
encryption options also used on the network.
The authentication methods supported by the HP Jetdirect wireless
print servers include:
Open System
,
Shared Key
,
EAP/802.1x
, and
EAP/PSK
.
Open System.
Open System authentication is used when positive
validation of a device's identity is not required for network access.
If a device is configured for Open System authentication, then any
other device or Access Point can authenticate with it. Open System
authentication is the factory-default authentication method
configured on HP Jetdirect wireless print servers.
While Open System authentication virtually allows open access to
a device, data security can still be implemented for the device using
encryption. For more information, see
Encryption
.
Note
If the print server is configured with Open System
authentication while the network requires EAP
authentication, the Jetdirect configuration page
will indicate a Ready status with an Authentication
Failed message.
Shared Key.
Shared Key authentication is used when a standard
level of validation for a device's identity is required before network
access is permitted. Shared Key authentication requires that WEP
security be implemented on all wireless network devices. In Shared
Key authentication, a secret WEP key must be independently
configured on each wireless device (that is, the same key is shared
by the devices on the network). During the authentication process,
a comparison is made between a transmitted challenge and an
encrypted and decrypted response. An appropriate match must
occur before access is allowed. For information on WEP keys, see
WEP Security.