About wireless lan security, Wpa supplicant – Sony RDP-XA700iPN User Manual

Page 31

Advertising
background image

27

US

• This product is protected by certain

intellectual property rights of Microsoft
Corporation. Use or distribution of such
technology outside of this product is
prohibited without a license from Microsoft
or an authorized Microsoft subsidiary.

The Wi-Fi Logo is a certification

mark of the Wi-Fi Alliance.

• The Wi-Fi Protected Setup™ Mark is a mark

of the Wi-Fi Alliance.

• Other trademarks and trade names are those

of their respective owners.

About wireless LAN security

Since communication via the wireless LAN
function is established by radio waves, the
wireless signal may be susceptible to
interception. To protect wireless
communication, this unit supports various
security functions. Be sure to correctly
configure the security settings in accordance
with your network environment.

No Security

Although you can easily make settings,
anyone can intercept wireless communication
or intrude into your wireless network, even
without any sophisticated tools. Keep in mind
that there is a risk of unauthorized access or
interception of data.

WEP

WEP applies security to communications to
prevent outsiders from intercepting
communications or intruding into your
wireless network. WEP is a legacy security
technology that enables older devices, which
do not support TKIP/AES, to be connected.

WPA-PSK (TKIP), WPA2-PSK
(TKIP)

TKIP is a security technology developed to
correct for the deficiencies of WEP. TKIP
assures a higher security level than WEP.

WPA-PSK (AES), WPA2-PSK (AES)

AES is a security technology that uses an
advanced security method that is distinct from
WEP and TKIP. AES assures a higher security
level than WEP or TKIP.

WPA Supplicant

Copyright (c) 2003-2006, Jouni Malinen
<[email protected]> and contributors
All Rights Reserved.
Redistribution and use in source and binary forms,
with or without modification, are permitted
provided that the following conditions are met:
1 Redistributions of source code must retain the

above copyright notice, this list of conditions and
the following disclaimer.

2 Redistributions in binary form must reproduce

the above copyright notice, this list of conditions
and the following disclaimer in the
documentation and/or other materials provided
with the distribution.

3 Neither the name(s) of the above-listed copyright

holder(s) nor the names of its contributors may be
used to endorse or promote products derived
from this software without specific prior written
permission.

THIS SOFTWARE IS PROVIDED BY THE
COPYRIGHT HOLDERS AND CONTRIBUTORS
“AS IS” AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED.
IN NO EVENT SHALL THE COPYRIGHT
OWNER OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING,
BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF
USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND
ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.

Advertising