HP Deskjet 5850 Color Inkjet Printer User Manual

Page 22

Advertising
background image

Each type of authentication has its benefits and limitations.

authentication

type

description

benefits

limitations

Open System

Devices on a

network do not

identify

themselves.

Least complicated

strategy.

Provides no

protection

against

unauthorized

users.

Shared Key

Devices use a

shared master

secret to identify

themselves as

authorized

members of the

network.

Convenient to use

in conjunction

with WEP since a

WEP can serve as

the shared

authentication

key.

All devices must

have the key.

The shared key

does not change

automatically.

EAP/PSK

Devices use a

single key to

identify

themselves as

authorized

members of the

network and to

generate an

encryption key.

The Pre-Shared

Key and the

encryption keys

are not identical.

Allows smaller

networks to use

WPA (TKIP)

without the need

for an

authorization

server.

Not as robust as

802.1x.

All devices must

have the key.

Advertising