Overview of security settings
●
Add hardware addresses to a wireless router (MAC filtering)
●
Other wireless security guidelines
Overview of security settings
To help improve the security of the wireless network and prevent unauthorized access, the printer
supports many common types of network authentication, including WEP, WPA, and WPA2.
236 Appendix D Network setup
ENWW
●
WEP: Provides security by encrypting data sent over radio waves from one wireless device to
another wireless device. Devices on a WEP-enabled network use WEP keys to encode data. If
your network uses WEP, you must know the WEP key(s) it uses.
●
WPA: Increases the level of over-the-air data protection and access control on existing and
future wireless networks. It addresses all known weaknesses of WEP, the original native security
mechanism in the 802.11 standard. WPA uses the Temporal Key Integrity Protocol (TKIP) for
encryption and employs 802.1X authentication with one of the standard Extensible
Authentication Protocol (EAP) types available today.
●
WPA2: Provides enterprise and consumer wireless users with a high level of assurance that only
authorized users can access their wireless networks. WPA2 provides the Advanced Encryption
Standard (AES). AES is defined in counter cipher-block chaining mode (CCM) and supports the
Independent Basic Service Set (IBSS) to enable security between client workstations operating
connected wirelessly without a wireless router (such as a Linksys wireless router or Apple
AirPort Base Station).