Sony RDP-XA700iPN Operating Instructions - Page 31

About wireless LAN security, WPA Supplicant, No Security, WPA-PSK TKIP, WPA2-PSK, WPA-PSK AES

Page 31 highlights

• This product is protected by certain intellectual property rights of Microsoft Corporation. Use or distribution of such technology outside of this product is prohibited without a license from Microsoft or an authorized Microsoft subsidiary. • The Wi-Fi Logo is a certification mark of the Wi-Fi Alliance. • The Wi-Fi Protected Setup™ Mark is a mark of the Wi-Fi Alliance. • Other trademarks and trade names are those of their respective owners. About wireless LAN security Since communication via the wireless LAN function is established by radio waves, the wireless signal may be susceptible to interception. To protect wireless communication, this unit supports various security functions. Be sure to correctly configure the security settings in accordance with your network environment. No Security Although you can easily make settings, anyone can intercept wireless communication or intrude into your wireless network, even without any sophisticated tools. Keep in mind that there is a risk of unauthorized access or interception of data. WEP WEP applies security to communications to prevent outsiders from intercepting communications or intruding into your wireless network. WEP is a legacy security technology that enables older devices, which do not support TKIP/AES, to be connected. WPA-PSK (TKIP), WPA2-PSK (TKIP) TKIP is a security technology developed to correct for the deficiencies of WEP. TKIP assures a higher security level than WEP. WPA-PSK (AES), WPA2-PSK (AES) AES is a security technology that uses an advanced security method that is distinct from WEP and TKIP. AES assures a higher security level than WEP or TKIP. WPA Supplicant Copyright (c) 2003-2006, Jouni Malinen and contributors All Rights Reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1 Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3 Neither the name(s) of the above-listed copyright holder(s) nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 27US

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100

27
US
This product is protected by certain
intellectual property rights of Microsoft
Corporation. Use or distribution of such
technology outside of this product is
prohibited without a license from Microsoft
or an authorized Microsoft subsidiary.
The Wi-Fi Logo is a certification
mark of the Wi-Fi Alliance.
The Wi-Fi Protected Setup™ Mark is a mark
of the Wi-Fi Alliance.
Other trademarks and trade names are those
of their respective owners.
About wireless LAN security
Since communication via the wireless LAN
function is established by radio waves, the
wireless signal may be susceptible to
interception. To protect wireless
communication, this unit supports various
security functions. Be sure to correctly
configure the security settings in accordance
with your network environment.
No Security
Although you can easily make settings,
anyone can intercept wireless communication
or intrude into your wireless network, even
without any sophisticated tools. Keep in mind
that there is a risk of unauthorized access or
interception of data.
WEP
WEP applies security to communications to
prevent outsiders from intercepting
communications or intruding into your
wireless network. WEP is a legacy security
technology that enables older devices, which
do not support TKIP/AES, to be connected.
WPA-PSK (TKIP), WPA2-PSK
(TKIP)
TKIP is a security technology developed to
correct for the deficiencies of WEP. TKIP
assures a higher security level than WEP.
WPA-PSK (AES), WPA2-PSK (AES)
AES is a security technology that uses an
advanced security method that is distinct from
WEP and TKIP. AES assures a higher security
level than WEP or TKIP.
WPA Supplicant
Copyright (c) 2003-2006, Jouni Malinen
<[email protected]> and contributors
All Rights Reserved.
Redistribution and use in source and binary forms,
with or without modification, are permitted
provided that the following conditions are met:
1
Redistributions of source code must retain the
above copyright notice, this list of conditions and
the following disclaimer.
2
Redistributions in binary form must reproduce
the above copyright notice, this list of conditions
and the following disclaimer in the
documentation and/or other materials provided
with the distribution.
3
Neither the name(s) of the above-listed copyright
holder(s) nor the names of its contributors may be
used to endorse or promote products derived
from this software without specific prior written
permission.
THIS SOFTWARE IS PROVIDED BY THE
COPYRIGHT HOLDERS AND CONTRIBUTORS
“AS IS” AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED.
IN NO EVENT SHALL THE COPYRIGHT
OWNER OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING,
BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF
USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND
ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.