8
encodes the data being sent across the network, making the data unintelligible to unauthorized
users. Both of these security methods are common on wireless networks.
Authentication
The Zebra ZXP Series 8 printer supports Open System authentication. A network with Open
System authentication does not screen network users based on their identities and usually
involves supplying the correct SSID. Such a network might use Wired Equivalent Privacy (WEP)
encryption to provide a first level of security, or Wi-Fi protected access (WPA/WPA2) to provide
security by encrypting data sent over radio waves from one wireless device to another wireless
device. The printer allows for WEP, WPA or WPA2.
Network name (SSID)
Wireless devices are configured with the name of the network to which they will connect. The
network name is also called the SSID and identifies the ESS (Extended Service Set) that is
normally associated with larger infrastructure networks. The SSID should not be considered a
security feature because it can be easily identified. However, as a network administration or
management feature, it does provide basic network access control.
It is common practice to setup access points such that the SSID is not broadcast (hidden or
invisible). The printer can connect to invisible access points, although the user must know the
SSID name and correctly enter it into the printer. There is a belief that that hiding the SSID adds
extra security to the network. This is in fact false as a device connecting to a network must send
the SSID in the clear and the SSID can be easily obtained from the association management
frame. Hiding the SSID simply makes it more error prone to connect to a network.
Encryption
To reduce your network exposure to eavesdropping, establish a wireless security key for your
network. The printer supports the WEP RC4 encryption, WPA TKIP encryption and WPA2 CCMP
encryption (a form of AES encryption), which hinders unauthorized users from accessing data
transmitted over the radio waves. For WEP, a single static WEP key (40 or 104 bits) is installed
in the printer. Each computer or device is configured with the same key to communicate on
that network. The most secure encryption is achieved using WPA2 with CCMP.
WPA and WPA2 security provides the means to deploy dynamic encryption keys to devices on
the network. There are two approaches that are used for key deployment which are usually
referred to as Personal and Enterprise. In the Personal mode, a Pre-Shared Key (PSK) is
deployed on each network access point and device. The PSK is then used to derive Transient
Keys which are used between an access point and the devices which are connected to it. In the
Enterprise mode, an authentication server is used to deploy keys using one of several available