HP Jetdirect 200m HP Jetdirect 200m Print Server (English) User Guide - Page 23

Wireless security, Network name SSID, Authentication

Page 23 highlights

NETWORKS Wireless security Wireless networks are inherently less secure than wired ones. In a wired environment an intruder needs to gain physical access to your network wiring to break into your network; in a wireless environment, he just needs to be in range of the radio waves that carry the network traffic. Since these waves penetrate building walls and easily carry for tens of meters, an intruder sitting in a car in your parking lot could monitor the traffic on the wireless LAN in your building. To frustrate intruders, a number of standards have been developed to make security for a wireless network more-or-less equivalent to that of wired networks. These standards work in three areas: Network name (SSID): A network name, or service set identifier (SSID) is an alphanumeric character string that provides basic access control on a wireless network. To transmit onto the network, the network name of a computer or other device must match the name configured into the access point. Authentication: Authentication verifies the identity of a user or device before the user or device is allowed to transmit onto the network. There are several different schemes of authentication that you might encounter when installing an HP Jetdirect print server: q Open system: No authentication. q Shared key: Each device

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181

NETWORKS
Wireless security
Wireless networks are inherently
less secure than wired ones. In a
wired environment an intruder
needs to gain physical access to
your network wiring to break into
your network; in a wireless
environment, he just needs to be
in range of the radio waves that
carry the network traffic. Since
these waves penetrate building
walls and easily carry for tens of
meters, an intruder sitting in a
car in your parking lot could
monitor the traffic on the
wireless LAN in your building.
To frustrate intruders, a number
of standards have been
developed to make security for a
wireless network more-or-less
equivalent to that of wired
networks. These standards work
in three areas:
Network name (SSID):
A
network name, or service set
identifier (SSID) is an
alphanumeric character string
that provides basic access control
on a wireless network. To
transmit onto the network, the
network name of a computer or
other device must match the
name configured into the access
point.
Authentication:
Authentication verifies the
identity of a user or device before
the user or device is allowed to
transmit onto the network. There
are several different schemes of
authentication that you might
encounter when installing an HP
Jetdirect print server:
Open system:
No
authentication.
Shared key:
Each device