HP Photosmart C4380 User Guide - Page 28

Open System, Shared Key, WPA-PSK, Not applicable, bit WEP, bit WEP, WPA-AES, WPA-TKIP, Automatic, - wireless setup mac

Page 28 highlights

Finish setup (continued) Parameter Description Authentication type Type of authentication in use: • None: No authentication in use. • Open System (ad hoc and infrastructure): No authentication • Shared Key: WEP key is required. • WPA-PSK (infrastructure only): WPA with Pre-Shared Key. • Not applicable: This parameter does not apply to this network type. Authentication verifies the identity of a user or device before granting access to the network, making it more difficult for unauthorized users to access network resources. This security method is common on wireless networks. A network using Open System authentication does not screen network users based on their identities. Any wireless user can have access from the network. However, such a network might use WEP (Wired Equivalent Privacy) encryption to provide a first level of security against casual eavesdroppers. A network using Shared Key authentication provides increased security by requiring users or devices to identify themselves with a static key (a hexadecimal or alphanumeric string). Every user or device on the network shares the same key. WEP encryption is used along with shared key authentication, using the same key for both authentication and encryption. A network using server-based (WPA-PSK) authentication provides significantly stronger security, and is supported in most wireless access points and wireless routers. The access point or router verifies the identity of a user or device requesting access to the network before granting that access. Several different authentication protocols might be used on an authentication server. Encryption The type of encryption in use on the network: • None: No encryption is in use. • 64-bit WEP: A 5-character or 10-hex-digit WEP key is in use. • 128-bit WEP: A 13-character or 26-hex-digit WEP key is in use. • WPA-AES: Advanced Encryption Standard encryption is in use. This is an encryption algorithm for securing sensitive but unclassified material by US Government agencies. • WPA-TKIP: Temporal Key Integrity Protocol, an advanced encryption protocol, is in use. • Automatic: AES or TKIP is in use. • Not applicable: This parameter does not apply to this network type. WEP aims to provide security by encrypting data over radio waves so that it is protected as it is transmitted from one end point to another. This security method is common on wireless networks. Access Point HW Address The hardware address of the wireless router or access point on the network to which the HP All-in-One is connected: • (MAC address): The unique MAC (Media Access Control) hardware address of the access point. • Not applicable: This parameter does not apply to this network type. Total Packets transmitted The number of packets transmitted by the HP All-in-One without error since it has been turned on. The counter clears after the HP All-in-One is turned off. When a message is transmitted over a packet-switching network, it is broken up into packets. Each packet contains the destination address as well as the data. Connect to a network 27

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179

Parameter
Description
Authentication
type
Type of authentication in use:
None
: No authentication in use.
Open System
(ad hoc and infrastructure): No authentication
Shared Key
: WEP key is required.
WPA-PSK
(infrastructure only): WPA with Pre-Shared Key.
Not applicable
: This parameter does not apply to this network type.
Authentication verifies the identity of a user or device before granting access
to the network, making it more difficult for unauthorized users to access
network resources. This security method is common on wireless networks.
A network using
Open System
authentication does not screen network users
based on their identities. Any wireless user can have access from the network.
However, such a network might use WEP (Wired Equivalent Privacy)
encryption to provide a first level of security against casual eavesdroppers.
A network using
Shared Key
authentication provides increased security by
requiring users or devices to identify themselves with a static key (a
hexadecimal or alphanumeric string). Every user or device on the network
shares the same key. WEP encryption is used along with shared key
authentication, using the same key for both authentication and encryption.
A network using server-based (
WPA-PSK
) authentication provides
significantly stronger security, and is supported in most wireless access
points and wireless routers. The access point or router verifies the identity of
a user or device requesting access to the network before granting that access.
Several different authentication protocols might be used on an authentication
server.
Encryption
The type of encryption in use on the network:
None
: No encryption is in use.
64-bit WEP
: A 5-character or 10-hex-digit WEP key is in use.
128-bit WEP
: A 13-character or 26-hex-digit WEP key is in use.
WPA-AES
: Advanced Encryption Standard encryption is in use. This is
an encryption algorithm for securing sensitive but unclassified material
by US Government agencies.
WPA-TKIP
: Temporal Key Integrity Protocol, an advanced encryption
protocol, is in use.
Automatic
: AES or TKIP is in use.
Not applicable
: This parameter does not apply to this network type.
WEP aims to provide security by encrypting data over radio waves so that it
is protected as it is transmitted from one end point to another. This security
method is common on wireless networks.
Access Point HW
Address
The hardware address of the wireless router or access point on the network
to which the HP All-in-One is connected:
(MAC address)
: The unique MAC (Media Access Control) hardware
address of the access point.
Not applicable
: This parameter does not apply to this network type.
Total Packets
transmitted
The number of packets transmitted by the HP All-in-One without error since
it has been turned on. The counter clears after the HP All-in-One is turned
off. When a message is transmitted over a packet-switching network, it is
broken up into packets. Each packet contains the destination address as well
as the data.
(continued)
Connect to a network
27
Finish setup