Sony RDP-XA700iPN Operating Instructions - Page 31
About wireless LAN security, WPA Supplicant, No Security, WPA-PSK TKIP, WPA2-PSK, WPA-PSK AES
View all Sony RDP-XA700iPN manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 31 highlights
• This product is protected by certain intellectual property rights of Microsoft Corporation. Use or distribution of such technology outside of this product is prohibited without a license from Microsoft or an authorized Microsoft subsidiary. • The Wi-Fi Logo is a certification mark of the Wi-Fi Alliance. • The Wi-Fi Protected Setup™ Mark is a mark of the Wi-Fi Alliance. • Other trademarks and trade names are those of their respective owners. About wireless LAN security Since communication via the wireless LAN function is established by radio waves, the wireless signal may be susceptible to interception. To protect wireless communication, this unit supports various security functions. Be sure to correctly configure the security settings in accordance with your network environment. No Security Although you can easily make settings, anyone can intercept wireless communication or intrude into your wireless network, even without any sophisticated tools. Keep in mind that there is a risk of unauthorized access or interception of data. WEP WEP applies security to communications to prevent outsiders from intercepting communications or intruding into your wireless network. WEP is a legacy security technology that enables older devices, which do not support TKIP/AES, to be connected. WPA-PSK (TKIP), WPA2-PSK (TKIP) TKIP is a security technology developed to correct for the deficiencies of WEP. TKIP assures a higher security level than WEP. WPA-PSK (AES), WPA2-PSK (AES) AES is a security technology that uses an advanced security method that is distinct from WEP and TKIP. AES assures a higher security level than WEP or TKIP. WPA Supplicant Copyright (c) 2003-2006, Jouni Malinen and contributors All Rights Reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1 Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3 Neither the name(s) of the above-listed copyright holder(s) nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 27US