Appendix a
(continued)
| number. Value is from 1 to 14; countries/regions might limit the range of |
| approved channels. |
| ● <number>: value ranging from 1 to 14, depending on country/region. |
| ● None: no channel is in use. |
| ● Not Applicable: the WLAN is disabled or this parameter does not apply |
| to this network type. |
| Note In ad hoc mode, if you are not able to receive or transmit data |
| between your computer and the HP |
| using the same communication channel on your computer and the |
| HP |
| access point. |
|
|
Authentication | Type of authentication in use: |
type | ● None: no authentication in use. |
| |
| ● Open System (ad hoc and infrastructure): no authentication. |
| ● Shared Key (infrastructure only): WEP key is required. |
| ● |
| ● Not applicable: this parameter does not apply to this network type. |
| Authentication verifies the identity of a user or device before granting access |
| to the network, making it more difficult for unauthorized users to get at |
| network resources. This security method is common on wireless networks. |
| A network using Open System authentication does not screen network users |
| based on their identities. Any wireless user can have access from the |
| network. However, such a network might use WEP (Wired Equivalent |
| Privacy) encryption to provide a first level of security against casual |
| eavesdroppers. |
| A network using Shared Key authentication provides increased security by |
| requiring users or devices to identify themselves with a static key (a |
| hexadecimal or alphanumeric string). Every user or device on the network |
| shares the same key. WEP encryption is used along with shared key |
| authentication, using the same key for both authentication and encryption. |
| A network using |
| significantly stronger security, and is supported in most wireless access |
| points and wireless routers. The access point or router verifies the identity of a |
| user or device requesting access to the network before granting that access. |
| Several different authentication protocols might be used on an authentication |
| server. |
| Note Shared key and |
| through the Embedded Web Server. |
|
|
Encryption | The type of encryption in use on the network: |
| ● None: no encryption is in use. |
| ● |
| ● |
| ● |
| an encryption algorithm for securing sensitive but unclassified material |
| by US Government agencies. |
| ● |
| protocol, is in use. |
|
|
24