HP Officejet 7610 - Overview of security settings

background image

Overview of security settings

Add hardware addresses to a wireless router (MAC filtering)

Other wireless security guidelines

Overview of security settings

To help improve the security of the wireless network and prevent unauthorized access, the printer

supports many common types of network authentication, including WEP, WPA, and WPA2.

236 Appendix D Network setup


background image

WEP: Provides security by encrypting data sent over radio waves from one wireless device to

another wireless device. Devices on a WEP-enabled network use WEP keys to encode data. If

your network uses WEP, you must know the WEP key(s) it uses.

WPA: Increases the level of over-the-air data protection and access control on existing and

future wireless networks. It addresses all known weaknesses of WEP, the original native security

mechanism in the 802.11 standard. WPA uses the Temporal Key Integrity Protocol (TKIP) for

encryption and employs 802.1X authentication with one of the standard Extensible

Authentication Protocol (EAP) types available today.

WPA2: Provides enterprise and consumer wireless users with a high level of assurance that only

authorized users can access their wireless networks. WPA2 provides the Advanced Encryption

Standard (AES). AES is defined in counter cipher-block chaining mode (CCM) and supports the

Independent Basic Service Set (IBSS) to enable security between client workstations operating

connected wirelessly without a wireless router (such as a Linksys wireless router or Apple

AirPort Base Station).