HP Deskjet 6980 User Guide - Macintosh - Page 30

Authentication and encryption, Authentication, Definition, Types of authentication, Description - password

Page 30 highlights

Chapter 4 Authentication and encryption Wireless security is a complex and developing topic. This page gives a brief overview of the basics involved in making a wireless network secure. In the simplest terms, wireless security involves two strategies: authentication and encryption. A wireless security method, such as WEP or WPA, involves varying levels of authentication and encryption. Authentication Definition Authentication verifies the identity of a user or device before granting access to a network, making it more difficult for unauthorized users to access network resources. In order to be authenticated and allowed to use a network, a device must supply a known password to other devices on the network. If the device cannot supply the correct password, it will not be able to use other devices on the network. Types of authentication The printer supports three types of authentication. Each type of authentication has its benefits and limitations. Authentication type Open System Shared Key WPA/PSK Description Benefits Limitations Devices on a network identify themselves with the network name (SSID) only. Least complicated strategy. Provides little protection against unauthorized users. Devices use a shared master secret to identify themselves as authorized members of the network. Convenient to use in conjunction with WEP, since a WEP key can serve as the shared authentication key. All devices must have the key. The shared key does not change automatically. Devices use a single pre-shared key (PSK) to identify themselves as authorized members of the network and to generate an encryption key. The pre-shared key and the encryption keys are not identical. Allows smaller networks to use WPA without the need for an authorization server. All devices must have the key. Encryption Definition 28 HP Deskjet 6980 series

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154

Authentication and encryption
Wireless security is a complex and developing topic. This page gives a brief overview of
the basics involved in making a wireless network secure.
In the simplest terms, wireless security involves two strategies: authentication and
encryption.
A wireless security method, such as
WEP
or
WPA
, involves varying levels of
authentication and encryption.
Authentication
Definition
Authentication verifies the identity of a user or device before granting access to a network,
making it more difficult for unauthorized users to access network resources.
In order to be authenticated and allowed to use a network, a device must supply a known
password to other devices on the network. If the device cannot supply the correct
password, it will not be able to use other devices on the network.
Types of authentication
The printer supports three types of authentication. Each type of authentication has its
benefits and limitations.
Authentication
type
Description
Benefits
Limitations
Open System
Devices on a
network identify
themselves with the
network name
(SSID) only.
Least complicated
strategy.
Provides little
protection against
unauthorized users.
Shared Key
Devices use a
shared master
secret to identify
themselves as
authorized
members of the
network.
Convenient to use
in conjunction with
WEP, since a WEP
key can serve as
the shared
authentication key.
All devices must
have the key. The
shared key does
not change
automatically.
WPA/PSK
Devices use a
single pre-shared
key (PSK) to
identify themselves
as authorized
members of the
network and to
generate an
encryption key.
The pre-shared key
and the encryption
keys are not
identical. Allows
smaller networks to
use WPA without
the need for an
authorization
server.
All devices must
have the key.
Encryption
Definition
Chapter 4
28
HP Deskjet 6980 series