HP Deskjet 6980 User Guide - Windows 2000 - Page 31

Types of authentication, Authentication, Description, Benefits, Limitations, Definition - printer support

Page 31 highlights

In order to be authenticated and allowed to use a network, a device must supply a known password to other devices on the network. If the device cannot supply the correct password, it will not be able to use other devices on the network. Types of authentication The printer supports three types of authentication. Each type of authentication has its benefits and limitations. Authentication type Open System Shared Key WPA/PSK Description Benefits Limitations Devices on a network identify themselves with the network name (SSID) only. Least complicated strategy. Provides little protection against unauthorized users. Devices use a shared master secret to identify themselves as authorized members of the network. Convenient to use in conjunction with WEP, since a WEP key can serve as the shared authentication key. All devices must have the key. The shared key does not change automatically. Devices use a single pre-shared key (PSK) to identify themselves as authorized members of the network and to generate an encryption key. The pre-shared key and the encryption keys are not identical. Allows smaller networks to use WPA without the need for an authorization server. All devices must have the key. Encryption Definition Encryption involves using a password to encode data sent over a wireless network in order to make the data unintelligible to eavesdroppers. Only devices that know the password can decode the data. Types of encryption The printer supports four types of encryption. Each type of encryption has its benefits and limitations. Encryption type Open System Description Devices on a network do not encrypt data. Benefits Least complicated strategy. Limitations Provides no protection against eavesdroppers. User's guide 29

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182

In order to be authenticated and allowed to use a network, a device must supply a known
password to other devices on the network. If the device cannot supply the correct
password, it will not be able to use other devices on the network.
Types of authentication
The printer supports three types of authentication. Each type of authentication has its
benefits and limitations.
Authentication
type
Description
Benefits
Limitations
Open System
Devices on a
network identify
themselves with the
network name
(SSID) only.
Least complicated
strategy.
Provides little
protection against
unauthorized users.
Shared Key
Devices use a
shared master
secret to identify
themselves as
authorized
members of the
network.
Convenient to use
in conjunction with
WEP, since a WEP
key can serve as
the shared
authentication key.
All devices must
have the key. The
shared key does
not change
automatically.
WPA/PSK
Devices use a
single pre-shared
key (PSK) to
identify themselves
as authorized
members of the
network and to
generate an
encryption key.
The pre-shared key
and the encryption
keys are not
identical. Allows
smaller networks to
use WPA without
the need for an
authorization
server.
All devices must
have the key.
Encryption
Definition
Encryption involves using a password to encode data sent over a wireless network in
order to make the data unintelligible to eavesdroppers. Only devices that know the
password can decode the data.
Types of encryption
The printer supports four types of encryption. Each type of encryption has its benefits
and limitations.
Encryption type
Description
Benefits
Limitations
Open System
Devices on a
network do not
encrypt data.
Least complicated
strategy.
Provides no
protection against
eavesdroppers.
User's guide
29