Reference Guide

reference guide
wireless network setup
143
wireless network setup
security
As with other networks, security for WLANs focuses on access control and
privacy. Traditional WLAN security includes the use of Service Set Identifiers
(SSIDs), open or shared-key authentication, static WEP keys, and optional Media
Access Control (MAC) authentication. This combination offers a basic level of
access control and privacy.
More advanced levels of security (such as WPA, Pre-shared key, and so forth) are
available through the HP PSC’s embedded Web server (EWS). For more
information about the EWS, see use the embedded web server on page 166.
Note: It is highly recommended that you implement a wireless security
scheme (either WEP or WPA) prior to setup. In addition, use an antivirus
program to protect against computer viruses, and follow basic security rules
such as setting strong passwords and not opening unknown attachments.
Other network components, including firewalls, intrusion-detection systems,
and segmented networks, should also be considered as part of your network
design.
Authentication and encryption are two different approaches to network security.
Authentication verifies the identity of a user or device before granting access to
the network, making it more difficult for unauthorized users to get at network
resources. Encryption encodes the data being sent across the network, making
the data unintelligible to eavesdroppers. Both of these security methods are
common on wireless networks.
authentication
The HP installation software supports Open System authentication. More
advanced forms of authentication are discussed in the glossary of terms on
page 168 and are available through the embedded Web server.
A network with Open System authentication does not screen network users based
on their identities and usually involves supplying the correct SSID. Such a network
might use WEP (Wired Equivalent Privacy) encryption to provide a first level of
security against casual eavesdroppers.
Note: Shared key and server-based authentication protocols are
implemented through the HP PSC embedded Web server and are discussed
in the glossary of terms on page 168.
encryption
To reduce your exposure to eavesdropping, establish a wireless security key for
your network. Your HP PSC installation software supports a wireless security
scheme called Wired Equivalent Privacy (WEP) to hinder unauthorized users from
accessing data transmitted over the radio waves. It is based on the use of a
single WEP key, where each computer or device is configured with the same key
to communicate on that network. For more information about WEP, see the
glossary of terms on page 168.
Note: Up to four WEP keys might be used on a wireless network for
transmission of data. If you have three computers and an access point, for
example, each might be assigned a distinct key for transmitting data.
However, the remaining keys must also be entered on each device so they
can communicate with each other.