HP PSC 2500 HP PSC 2500 series All-in-One - (English) Reference Guide - Page 91

infrastructure only: EAP with Pre-Shared Key WPA/PSK., Open System, Shared Key, bit WEP, Dynamic

Page 91 highlights

network config tools use the network configuration tools field Authentication Type Encryption description Type of authentication in use: • Open System (ad-hoc and infrastructure): no authentication. • Shared Key (infrastructure only): WEP key is required. • LEAP (infrastructure only): EAP server authentication is required. • PEAP (infrastructure only): EAP server authentication is required. • EAP-TLS (infrastructure only): EAP server authentication is required. • EAP-MD5 (infrastructure only): EAP server authentication is required. • EAP-TTLS (infrastructure only): EAP server authentication is required. • EAP-PSK (infrastructure only): EAP with Pre-Shared Key (WPA/PSK). Authentication verifies the identity of a user or device before granting access to the network, making it more difficult for unauthorized users to get at network resources. This security method is common on wireless networks. A network using Open System authentication does not screen network users based on their identities. Any wireless user can have access from the network. However, such a network might use WEP (Wired Equivalent Privacy) encryption to provide a first level of security against casual eavesdroppers. A network using Shared Key authentication provides increased security by requiring users or devices to identify themselves with a static key (a hexidecimal or alphanumeric string). This key is shared by all users of the network -- that is, every user or device uses the same key. WEP encryption is used along with shared key authentication, using the same key for both authentication and encryption. A network using server-based (EAP/802.1x) authentication provides significantly stronger security, and is commonly used in enterprise-level networks. A dedicated server resides on the network and verifies the identity of a user or device requesting access to the network before granting that access. Several different authentication protocols might be used on an authentication server. Note: Shared key and EAP/802.1x authentication can only be entered through the EWS. The type of encryption in use on the network: • None: no encryption is in use. • 64-bit WEP: a 5-character or 10-hex-digit WEP key is in use. • 128-bit WEP: a 13-character or 26-hex-digit WEP key is in use. • Dynamic: dynamic encryption is being used with WEP, TKIP, or both. WEP aims to provide security by encrypting data over radio waves so that it is protected as it is transmitted from one end point to another. This security method is common on wireless networks. reference guide 81

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246

reference guide
use the network configuration tools
81
network config tools
Authentication Type
Type of authentication in use:
Open System
(ad-hoc and infrastructure): no authentication.
Shared Key
(infrastructure only): WEP key is required.
• LEAP
(infrastructure only): EAP server authentication is required.
• PEAP
(infrastructure only): EAP server authentication is required.
• EAP-TLS
(infrastructure only): EAP server authentication is required.
• EAP-MD5
(infrastructure only): EAP server authentication is required.
• EAP-TTLS
(infrastructure only): EAP server authentication is required.
• EAP-PSK
(infrastructure only): EAP with Pre-Shared Key (WPA/PSK).
Authentication verifies the identity of a user or device before granting
access to the network, making it more difficult for unauthorized users to
get at network resources. This security method is common on wireless
networks.
A network using Open System authentication does not screen network
users based on their identities. Any wireless user can have access from
the network. However, such a network might use WEP (Wired Equivalent
Privacy) encryption to provide a first level of security against casual
eavesdroppers.
A network using Shared Key authentication provides increased security
by requiring users or devices to identify themselves with a static key (a
hexidecimal or alphanumeric string). This key is shared by all users of the
network -- that is, every user or device uses the same key. WEP encryption
is used along with shared key authentication, using the same key for both
authentication and encryption.
A network using server-based (EAP/802.1x) authentication provides
significantly stronger security, and is commonly used in enterprise-level
networks. A dedicated server resides on the network and verifies the
identity of a user or device requesting access to the network before
granting that access. Several different authentication protocols might be
used on an authentication server.
Note:
Shared key and EAP/802.1x authentication can only be
entered through the EWS.
Encryption
The type of encryption in use on the network:
None
: no encryption is in use.
64-bit WEP
: a 5-character or 10-hex-digit WEP key is in use.
128-bit WEP
: a 13-character or 26-hex-digit WEP key is in use.
Dynamic
: dynamic encryption is being used with WEP, TKIP, or
both.
WEP aims to provide security by encrypting data over radio waves so
that it is protected as it is transmitted from one end point to another. This
security method is common on wireless networks.
field
description