HP Deskjet 6800 series printer
•WEP
•Open system
Ad hoc networks (wireless
•WEP
•Open system
Wireless security basics
For more information about wireless security, see the authentication and encryption page.
4.2.6 Authentication and encryption
Wireless security is a complex and developing topic. This page gives a brief overview of the basics involved in making a wireless network secure.
In the simplest terms, wireless security involves two strategies: authentication and encryption.
A wireless security method, such as WEP or WPA, involves varying levels of authentication and encryption.
Authentication
Definition
Authentication verifies the identity of a user or device before granting access to a network, making it more difficult for unauthorized users to access network resources.
In order to be authenticated and allowed to use a network, a device must supply a known password to other devices on the network. If the device cannot supply the correct password, then it will not be able to use other devices on the network.
Types of authentication
The printer supports three types of authentication. Each type of authentication has its benefits and limitations.
Authentication type |
| Description |
| Benefits |
| Limitations |
|
| Devices on a |
|
|
|
|
|
| network identify |
|
|
| Provides little |
|
| themselves with |
| Least complicated |
| |
Open System |
|
|
| protection against | ||
| the network |
| strategy. |
| ||
|
|
|
| unauthorized users. | ||
|
| name (SSID) |
|
|
| |
|
|
|
|
|
|
only.
26