HP 680n HP Wireless Print Server 680n - (English) Setup Guide - Page 17
Encryption, TKIP Temporal Key Integrity Protocol, are typically used
UPC - 808736198622
View all HP 680n manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 17 highlights
Encryption Wireless networks use radio signals for network communications, which can be easily monitored by someone eavesdropping on the network. To deter eavesdropping and to help ensure data privacy, encryption of wireless communications may be used. WEP (Wired Equivalent Privacy) encryption protocols were developed to provide a basic level of data privacy. WEP protocols use encryption keys to encrypt and decrypt wireless communications. Note WEP encryption levels are sometimes called "40-bit", "64-bit", "104-bit" or "128-bit" encryption. Both 40-bit and 64-bit encryption are really the same, as are 104bit and 128-bit encryption. When entering WEP keys, the user specifies 40 bits for 64-bit encryption, or 104 bits for 128-bit encryption. An additional 24 initialization vector (IV) bits are automatically added for a total of 64 bits and 128 bits, respectively. In this guide, we will use "40/64-bit" and "104/128-bit" to specify these WEP encryption levels. For basic encryption, static WEP keys are configured on each device on the wireless network. WEP keys are considered static because they remain the same unless manually reconfigured. For example, on a typical Infrastructure mode network that uses static WEP encryption, a change to the WEP key on an Access Point will require a manual change to the WEP key on each wireless device. For advanced encryption methods, dynamic encryption protocols are used. For dynamic encryption protocols, encryption keys are automatically changed at routine intervals making them difficult to decipher. Dynamic encryption protocols, such as dynamic WEP and TKIP (Temporal Key Integrity Protocol), are typically used on highly-secure networks that use authentication servers for network access. Introduction 1-9