Sony BDV-E580 Operating Instructions - Page 56
About wireless LAN security, No Security, WPA-PSK TKIP, WPA2-PSK, WPA-PSK AES
UPC - 027242809734
View all Sony BDV-E580 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 56 highlights
4 Press X/x to select the security mode, then press . • [None]: Select this if the wireless LAN is unsecured. Setup of wireless LAN connectivity is finished. Next, enter the IP address settings by following the Steps of "Auto setting" or "Manual setting" in "When connecting to the LAN with a LAN cable" above. • [WEP]: The wireless LAN is protected by a WEP key. • [WPA/WPA2-PSK]: The wireless LAN is protected by a WPA-PSK or WPA2-PSK. • [WPA2-PSK]: The wireless LAN is protected by a WPA2-PSK. 5 Enter the WEP key/WPA key by following the on-screen messages, then press c. Setup of wireless LAN connectivity is finished. Next, enter the IP address settings by following the Steps of "Auto setting" or "Manual setting" in "When connecting to the LAN with a LAN cable" above. WEP WEP applies security to communications to prevent outsiders from intercepting communications or intruding into your wireless network. WEP is a legacy security technology that enables older device which do not support TKIP/AES to be connected. WPA-PSK (TKIP), WPA2-PSK (TKIP) TKIP is a security technology developed in response to the deficiencies of WEP. TKIP assures a higher security level than WEP. WPA-PSK (AES), WPA2-PSK (AES) AES is a security technology that uses an advanced security method distinct from WEP and TKIP. AES assures a higher security level than WEP or TKIP. About wireless LAN security Since communication via the wireless LAN function is established by radio waves, the wireless signal may be susceptible to interception. To protect wireless communication, this system supports various security functions. Be sure to correctly configure the security settings in accordance with your network environment. No Security Although you can easily make settings, anyone can intercept wireless communication or intrude into your wireless network, even without any sophisticated tools. Keep in mind that there is a risk of unauthorized access or interception of data. 56US