HP C8975A HP Deskjet 5800 Series printer - (English) User Guide - Page 15

WEP key, Wireless Access Point WAP, Wireless profile, A Wireless Access Point WAP is a device through

Page 15 highlights

the network. v w WEP:Wired Equivalent Privacy (WEP) provides security by encrypting data sent over radio waves from one wireless device to another wireless device. WEP encodes the data sent across the network making the data unintelligible to eavesdroppers. Only devices that share the same WEP settings as the printer will be able to communicate with the printer. WEP depends on encryption keys that are static and provides less security than WPA (TKIP). WEP key:A WEP key, or encryption key, is a sequence of alphanumeric characters or hexadecimal digits. After creating a WEP key, you must remember it or store it in a secure location. You may not be able to retrieve the WEP key if you lose it. A WEP key is either 64 or 128 bits long. The first 24 bits of the key are provided automatically. When creating the WEP key, the person creating the key provides the remaining bits (40 bits in the case of a 64-bit key, or 104 bits in the case of a 128-bit key). Wireless Access Point (WAP):A Wireless Access Point (WAP) is a device through which devices (for example, computers and printers) on an infrastructure wireless network communicate with one another. A WAP is also called a base station. Wireless profile:A wireless profile is a collection of wireless network settings that applies to a particular wireless network. For example, a wireless LAN card can have one profile for a home network and another profile for an office network. When installing a device on a network, be sure to select the appropriate profile. WPA: WPA provides security by encrypting data sent over radio waves from one wireless device to another wireless device and by controlling access to network resources through authentication protocols. Only devices that share the same WPA settings as the printer will be able to communicate with the printer. WPA uses encryption keys that change frequently. WPA provides better security than WEP. WPA is also called TKIP. x y z

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217

the network.
v
w
WEP
:Wired Equivalent Privacy (WEP) provides security by encrypting data sent over
radio waves from one wireless device to another wireless device. WEP encodes the
data sent across the network making the data unintelligible to eavesdroppers. Only
devices that share the same WEP settings as the printer will be able to communicate
with the printer. WEP depends on encryption keys that are static and provides less
security than
WPA (TKIP)
.
WEP key
:A WEP key, or encryption key, is a sequence of alphanumeric characters or
hexadecimal digits. After creating a WEP key, you must remember it or store it in a
secure location. You may not be able to retrieve the WEP key if you lose it. A WEP
key is either 64 or 128 bits long. The first 24 bits of the key are provided
automatically. When creating the WEP key, the person creating the key provides the
remaining bits (40 bits in the case of a 64-bit key, or 104 bits in the case of a 128-bit
key).
Wireless Access Point (WAP)
:A Wireless Access Point (WAP) is a device through
which devices (for example, computers and printers) on an infrastructure wireless
network communicate with one another. A WAP is also called a base station.
Wireless profile
:A wireless profile is a collection of wireless network settings that
applies to a particular wireless network. For example, a wireless LAN card can have
one profile for a home network and another profile for an office network. When
installing a device on a network, be sure to select the appropriate profile.
WPA
: WPA provides security by encrypting data sent over radio waves from one
wireless device to another wireless device and by controlling access to network
resources through authentication protocols. Only devices that share the same WPA
settings as the printer will be able to communicate with the printer. WPA uses
encryption keys that change frequently. WPA provides better security than
WEP
. WPA
is also called TKIP.
x
y
z