HP PSC 2500 HP PSC 2500 series All-in-One - (English) Reference Guide - Page 153

security - wpa

Page 153 highlights

wireless network setup wireless network setup security As with other networks, security for WLANs focuses on access control and privacy. Traditional WLAN security includes the use of Service Set Identifiers (SSIDs), open or shared-key authentication, static WEP keys, and optional Media Access Control (MAC) authentication. This combination offers a basic level of access control and privacy. More advanced levels of security (such as WPA, Pre-shared key, and so forth) are available through the HP PSC's embedded Web server (EWS). For more information about the EWS, see use the embedded web server on page 166. Note: It is highly recommended that you implement a wireless security scheme (either WEP or WPA) prior to setup. In addition, use an antivirus program to protect against computer viruses, and follow basic security rules such as setting strong passwords and not opening unknown attachments. Other network components, including firewalls, intrusion-detection systems, and segmented networks, should also be considered as part of your network design. Authentication and encryption are two different approaches to network security. Authentication verifies the identity of a user or device before granting access to the network, making it more difficult for unauthorized users to get at network resources. Encryption encodes the data being sent across the network, making the data unintelligible to eavesdroppers. Both of these security methods are common on wireless networks. authentication The HP installation software supports Open System authentication. More advanced forms of authentication are discussed in the glossary of terms on page 168 and are available through the embedded Web server. A network with Open System authentication does not screen network users based on their identities and usually involves supplying the correct SSID. Such a network might use WEP (Wired Equivalent Privacy) encryption to provide a first level of security against casual eavesdroppers. Note: Shared key and server-based authentication protocols are implemented through the HP PSC embedded Web server and are discussed in the glossary of terms on page 168. encryption To reduce your exposure to eavesdropping, establish a wireless security key for your network. Your HP PSC installation software supports a wireless security scheme called Wired Equivalent Privacy (WEP) to hinder unauthorized users from accessing data transmitted over the radio waves. It is based on the use of a single WEP key, where each computer or device is configured with the same key to communicate on that network. For more information about WEP, see the glossary of terms on page 168. Note: Up to four WEP keys might be used on a wireless network for transmission of data. If you have three computers and an access point, for example, each might be assigned a distinct key for transmitting data. However, the remaining keys must also be entered on each device so they can communicate with each other. reference guide 143

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246

reference guide
wireless network setup
143
wireless network setup
security
As with other networks, security for WLANs focuses on access control and
privacy. Traditional WLAN security includes the use of Service Set Identifiers
(SSIDs), open or shared-key authentication, static WEP keys, and optional Media
Access Control (MAC) authentication. This combination offers a basic level of
access control and privacy.
More advanced levels of security (such as WPA, Pre-shared key, and so forth) are
available through the HP PSC’s embedded Web server (EWS). For more
information about the EWS, see
use the embedded web server
on page 166.
Note:
It is highly recommended that you implement a wireless security
scheme (either WEP or WPA) prior to setup. In addition, use an antivirus
program to protect against computer viruses, and follow basic security rules
such as setting strong passwords and not opening unknown attachments.
Other network components, including firewalls, intrusion-detection systems,
and segmented networks, should also be considered as part of your network
design.
Authentication and encryption are two different approaches to network security.
Authentication verifies the identity of a user or device before granting access to
the network, making it more difficult for unauthorized users to get at network
resources. Encryption encodes the data being sent across the network, making
the data unintelligible to eavesdroppers. Both of these security methods are
common on wireless networks.
authentication
The HP installation software supports Open System authentication. More
advanced forms of authentication are discussed in the
glossary of terms
on
page 168 and are available through the embedded Web server.
A network with Open System authentication does not screen network users based
on their identities and usually involves supplying the correct SSID. Such a network
might use WEP (Wired Equivalent Privacy) encryption to provide a first level of
security against casual eavesdroppers.
Note:
Shared key and server-based authentication protocols are
implemented through the HP PSC embedded Web server and are discussed
in the
glossary of terms
on page 168.
encryption
To reduce your exposure to eavesdropping, establish a wireless security key for
your network. Your HP PSC installation software supports a wireless security
scheme called Wired Equivalent Privacy (WEP) to hinder unauthorized users from
accessing data transmitted over the radio waves. It is based on the use of a
single WEP key, where each computer or device is configured with the same key
to communicate on that network. For more information about WEP, see the
glossary of terms
on page 168.
Note:
Up to four WEP keys might be used on a wireless network for
transmission of data. If you have three computers and an access point, for
example, each might be assigned a distinct key for transmitting data.
However, the remaining keys must also be entered on each device so they
can communicate with each other.