HP C8975A HP Deskjet 5800 Series printer - (English) User Guide - Page 22
Shared Key, The Pre-Shared
View all HP C8975A manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 22 highlights
Each type of authentication has its benefits and limitations. authentication type description benefits limitations Open System Devices on a network do not identify themselves. Least complicated strategy. Provides no protection against unauthorized users. Shared Key Devices use a shared master secret to identify themselves as authorized members of the network. Convenient to use in conjunction with WEP since a WEP can serve as the shared authentication key. All devices must have the key. The shared key does not change automatically. EAP/PSK Devices use a single key to identify themselves as authorized members of the network and to generate an encryption key. The Pre-Shared Key and the encryption keys are not identical. Allows smaller networks to use WPA (TKIP) without the need for an authorization server. Not as robust as 802.1x. All devices must have the key.