HP Deskjet 6980 User Guide - Windows 2000 - Page 30

Wireless security, Authentication and encryption, Infrastructure networks - wireless setup mac

Page 30 highlights

Chapter 4 Wireless security The printer can be configured for several wireless security options depending on the type of wireless network of which the printer is part. Infrastructure networks ● WPA ● WEP ● Open System Ad hoc networks (wireless direct-connect) ● WEP ● Open System For more information about wireless security, see the authentication and encryption page. Add security to the network As with other networks, security for wireless local area networks (WLANs) focuses on access control and privacy. Traditional WLAN security includes the use of Service Set Identifiers (SSIDs), open or shared-key authentication, static Wired Equivalent Privacy (WEP) keys, and optional Media Access Control (MAC) authentication. This combination offers a rudimentary level of access control and privacy. If you are using an access point, you might also employ advanced forms of authentication and encryption on the WLAN, such as the Pre-Shared Key mode of Wi-Fi Protected Access (WPA-PSK). To protect the wireless network, HP strongly suggests you implement a wireless security scheme (either WEP or WPA) during setup, use an antivirus program to protect against computer viruses, and follow basic security rules such as setting strong passwords and not opening unknown attachments. Other network components, including firewalls, intrusion-detection systems, and segmented networks, should also be considered as part of the network design. Note If you decide to add encryption and authentication to the network after installing the printer, change the settings on the printer prior to changing them on other devices on the network. Authentication and encryption Wireless security is a complex and developing topic. This page gives a brief overview of the basics involved in making a wireless network secure. In the simplest terms, wireless security involves two strategies: authentication and encryption. A wireless security method, such as WEP or WPA, involves varying levels of authentication and encryption. Authentication Definition Authentication verifies the identity of a user or device before granting access to a network, making it more difficult for unauthorized users to access network resources. 28 HP Deskjet 6980 series

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182

Wireless security
The printer can be configured for several wireless security options depending on the type
of wireless network of which the printer is part.
Infrastructure networks
WPA
WEP
Open System
Ad hoc networks (wireless direct-connect)
WEP
Open System
For more information about wireless security, see the
authentication and encryption
page
.
Add security to the network
As with other networks, security for wireless local area networks (WLANs) focuses on
access control and privacy. Traditional WLAN security includes the use of Service Set
Identifiers (SSIDs), open or shared-key authentication, static Wired Equivalent Privacy
(WEP) keys, and optional Media Access Control (MAC) authentication. This combination
offers a rudimentary level of access control and privacy.
If you are using an access point, you might also employ advanced forms of authentication
and encryption on the WLAN, such as the Pre-Shared Key mode of Wi-Fi Protected
Access (WPA-PSK).
To protect the wireless network, HP strongly suggests you implement a wireless security
scheme (either WEP or WPA) during setup, use an antivirus program to protect against
computer viruses, and follow basic security rules such as setting strong passwords and
not opening unknown attachments. Other network components, including firewalls,
intrusion-detection systems, and segmented networks, should also be considered as part
of the network design.
Note
If you decide to add encryption and authentication to the network after
installing the printer, change the settings on the printer prior to changing them on
other devices on the network.
Authentication and encryption
Wireless security is a complex and developing topic. This page gives a brief overview of
the basics involved in making a wireless network secure.
In the simplest terms, wireless security involves two strategies: authentication and
encryption.
A wireless security method, such as
WEP
or
WPA
, involves varying levels of
authentication and encryption.
Authentication
Definition
Authentication verifies the identity of a user or device before granting access to a network,
making it more difficult for unauthorized users to access network resources.
Chapter 4
28
HP Deskjet 6980 series