wireless network setup
security
As with other networks, security for WLANs focuses on access control and privacy. Traditional WLAN security includes the use of Service Set Identifiers (SSIDs), open or
More advanced levels of security (such as WPA,
Note: It is highly recommended that you implement a wireless security scheme (either WEP or WPA) prior to setup. In addition, use an antivirus program to protect against computer viruses, and follow basic security rules such as setting strong passwords and not opening unknown attachments. Other network components, including firewalls,
Authentication and encryption are two different approaches to network security. Authentication verifies the identity of a user or device before granting access to the network, making it more difficult for unauthorized users to get at network resources. Encryption encodes the data being sent across the network, making the data unintelligible to eavesdroppers. Both of these security methods are common on wireless networks.
authentication
The HP installation software supports Open System authentication. More advanced forms of authentication are discussed in the glossary of terms on page 168 and are available through the embedded Web server.
A network with Open System authentication does not screen network users based on their identities and usually involves supplying the correct SSID. Such a network might use WEP (Wired Equivalent Privacy) encryption to provide a first level of security against casual eavesdroppers.
Note: Shared key and
encryption
To reduce your exposure to eavesdropping, establish a wireless security key for your network. Your HP PSC installation software supports a wireless security scheme called Wired Equivalent Privacy (WEP) to hinder unauthorized users from accessing data transmitted over the radio waves. It is based on the use of a single WEP key, where each computer or device is configured with the same key to communicate on that network. For more information about WEP, see the glossary of terms on page 168.
Note: Up to four WEP keys might be used on a wireless network for transmission of data. If you have three computers and an access point, for example, each might be assigned a distinct key for transmitting data. However, the remaining keys must also be entered on each device so they can communicate with each other.
setup network wireless
reference guide | 143 |