HP 6840 HP Deskjet 6800 Printer series - (Windows) User's Guide - Page 26

Wireless security basics, Authentication and encryption, Authentication

Page 26 highlights

HP Deskjet 6800 series printer • WEP • Open system Ad hoc networks (wireless direct-connect) • WEP • Open system Wireless security basics For more information about wireless security, see the authentication and encryption page. 4.2.6 Authentication and encryption Wireless security is a complex and developing topic. This page gives a brief overview of the basics involved in making a wireless network secure. In the simplest terms, wireless security involves two strategies: authentication and encryption. A wireless security method, such as WEP or WPA, involves varying levels of authentication and encryption. Authentication Definition Authentication verifies the identity of a user or device before granting access to a network, making it more difficult for unauthorized users to access network resources. In order to be authenticated and allowed to use a network, a device must supply a known password to other devices on the network. If the device cannot supply the correct password, then it will not be able to use other devices on the network. Types of authentication The printer supports three types of authentication. Each type of authentication has its benefits and limitations. Authentication type Description Open System Devices on a network identify themselves with the network name (SSID) only. Benefits Least complicated strategy. Limitations Provides little protection against unauthorized users. 26

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193

WEP
Open system
Ad hoc networks (wireless direct-connect)
WEP
Open system
Wireless security basics
For more information about wireless security, see the
authentication and encryption
page
.
4.2.6
Authentication and encryption
Wireless security is a complex and developing topic. This page gives a brief
overview of the basics involved in making a wireless network secure.
In the simplest terms, wireless security involves two strategies: authentication and
encryption.
A wireless security method, such as
WEP
or
WPA
, involves varying levels of
authentication and encryption.
Authentication
Definition
Authentication verifies the identity of a user or device before granting access to a
network, making it more difficult for unauthorized users to access network
resources.
In order to be authenticated and allowed to use a network, a device must supply a
known password to other devices on the network. If the device cannot supply the
correct password, then it will not be able to use other devices on the network.
Types of authentication
The printer supports three types of authentication. Each type of authentication has
its benefits and limitations.
Authentication type
Description
Benefits
Limitations
Open System
Devices on a
network identify
themselves with
the network
name (SSID)
only.
Least complicated
strategy.
Provides little
protection against
unauthorized users.
HP Deskjet 6800 series printer
26