HP Deskjet 5850 Color Inkjet Printer User Manual
Page 22
Each type of authentication has its benefits and limitations.
authentication
type
description
benefits
limitations
Open System
Devices on a
network do not
identify
themselves.
Least complicated
strategy.
Provides no
protection
against
unauthorized
users.
Shared Key
Devices use a
shared master
secret to identify
themselves as
authorized
members of the
network.
Convenient to use
in conjunction
with WEP since a
WEP can serve as
the shared
authentication
key.
All devices must
have the key.
The shared key
does not change
automatically.
EAP/PSK
Devices use a
single key to
identify
themselves as
authorized
members of the
network and to
generate an
encryption key.
The Pre-Shared
Key and the
encryption keys
are not identical.
Allows smaller
networks to use
WPA (TKIP)
without the need
for an
authorization
server.
Not as robust as
802.1x.
All devices must
have the key.