Wireless security, Authentication and encryption, Wireless – HP Deskjet 6988dt Printer User Manual

Page 30

Advertising
background image

Wireless security

The printer can be configured for several wireless security options depending on the type
of wireless network of which the printer is part.
Infrastructure networks

WPA

WEP

Open System

Ad hoc networks (wireless direct-connect)

WEP

Open System

For more information about wireless security, see the

authentication and encryption

page

.

Add security to the network
As with other networks, security for wireless local area networks (WLANs) focuses on
access control and privacy. Traditional WLAN security includes the use of Service Set
Identifiers (SSIDs), open or shared-key authentication, static Wired Equivalent Privacy
(WEP) keys, and optional Media Access Control (MAC) authentication. This combination
offers a rudimentary level of access control and privacy.
If you are using an access point, you might also employ advanced forms of authentication
and encryption on the WLAN, such as the Pre-Shared Key mode of Wi-Fi Protected
Access (WPA-PSK).
To protect the wireless network, HP strongly suggests you implement a wireless security
scheme (either WEP or WPA) during setup, use an antivirus program to protect against
computer viruses, and follow basic security rules such as setting strong passwords and
not opening unknown attachments. Other network components, including firewalls,
intrusion-detection systems, and segmented networks, should also be considered as part
of the network design.

Note

If you decide to add encryption and authentication to the network after

installing the printer, change the settings on the printer prior to changing them on
other devices on the network.

Authentication and encryption

Wireless security is a complex and developing topic. This page gives a brief overview of
the basics involved in making a wireless network secure.
In the simplest terms, wireless security involves two strategies: authentication and
encryption.
A wireless security method, such as

WEP

or

WPA

, involves varying levels of

authentication and encryption.

Authentication
Definition
Authentication verifies the identity of a user or device before granting access to a network,
making it more difficult for unauthorized users to access network resources.

Chapter 4

28

HP Deskjet 6980 series

Advertising