HP Deskjet 6980 User Guide - Macintosh - Page 29

Wireless security, Infrastructure networks, Ad hoc networks wireless direct-connect - wireless setup mac

Page 29 highlights

1 Network name equals "network_1" 2 Network name equals "network_2" Wireless security The printer can be configured for several wireless security options depending on the type of wireless network of which the printer is part. Infrastructure networks ● WPA ● WEP ● Open System Ad hoc networks (wireless direct-connect) ● WEP ● Open System For more information about wireless security, see the authentication and encryption page. Add security to the network As with other networks, security for wireless local area networks (WLANs) focuses on access control and privacy. Traditional WLAN security includes the use of Service Set Identifiers (SSIDs), open or shared-key authentication, static Wired Equivalent Privacy (WEP) keys, and optional Media Access Control (MAC) authentication. This combination offers a rudimentary level of access control and privacy. If you are using an access point, you might also employ advanced forms of authentication and encryption on the WLAN, such as the Pre-Shared Key mode of Wi-Fi Protected Access (WPA-PSK). To protect the wireless network, HP strongly suggests you implement a wireless security scheme (either WEP or WPA) during setup, use an antivirus program to protect against computer viruses, and follow basic security rules such as setting strong passwords and not opening unknown attachments. Other network components, including firewalls, intrusion-detection systems, and segmented networks, should also be considered as part of the network design. Note If you decide to add encryption and authentication to the network after installing the printer, change the settings on the printer prior to changing them on other devices on the network. User's guide 27

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154

1
Network name equals "network_1"
2
Network name equals "network_2"
Wireless security
The printer can be configured for several wireless security options depending on the type
of wireless network of which the printer is part.
Infrastructure networks
WPA
WEP
Open System
Ad hoc networks (wireless direct-connect)
WEP
Open System
For more information about wireless security, see the
authentication and encryption
page
.
Add security to the network
As with other networks, security for wireless local area networks (WLANs) focuses on
access control and privacy. Traditional WLAN security includes the use of Service Set
Identifiers (SSIDs), open or shared-key authentication, static Wired Equivalent Privacy
(WEP) keys, and optional Media Access Control (MAC) authentication. This combination
offers a rudimentary level of access control and privacy.
If you are using an access point, you might also employ advanced forms of authentication
and encryption on the WLAN, such as the Pre-Shared Key mode of Wi-Fi Protected
Access (WPA-PSK).
To protect the wireless network, HP strongly suggests you implement a wireless security
scheme (either WEP or WPA) during setup, use an antivirus program to protect against
computer viruses, and follow basic security rules such as setting strong passwords and
not opening unknown attachments. Other network components, including firewalls,
intrusion-detection systems, and segmented networks, should also be considered as part
of the network design.
Note
If you decide to add encryption and authentication to the network after
installing the printer, change the settings on the printer prior to changing them on
other devices on the network.
User's guide
27