Sony BDV-E980 Manual page 56

Blu-ray disc/dvd home theatre system
Hide thumbs Also See for BDV-E980:
Table of Contents

Advertisement

4
5
Press ,t,/4, to select the security mode,
then press @.
• [None]: Select this Jrthe wireless LAN is
unsecured.
Setup of wireless LAN
connectivity
is finished. Next, enter the IP
address settings by following
the Steps of
"Auto setting" or "Manual
setting"
in
"When connecting
to the LAN with a
LAN cable" above.
• [WEP]: The wireless LAN is protected by
a WEP key.
• [WPA/WPA2-PSK]:
The wireless LAN is
protected by a WPA-PSK
or WPA2-PSK.
• [WPA2-PSK]:
The wireless LAN is
protected
by a WPA2-PSK.
Enter the WEP key/WPA key by
following
the on-screen
messages,
then press ->.
Setup of wireless LAN connectivity
is
finished. Next, enter the IP address settings
by tMlowing
the Steps of "Auto setting" or
"Manual
setting"
in "When connecting
to
the LAN with a LAN cable" above.
WEP
WEP applies security to communications
to
prevent outsiders
fiom intercepting
communications
or intruding into your wireless
network. WEP is a legacy security technology
that enables older device which do not support
TKIP/AES
to be connected.
WPA-PSK
(TKIP),
WPA2-PSK
(TKIP)
TKIP is a security technology
developed
in
response
to the deficiencies
of WEP. TKIP
assures a higher security level than WEP.
WPA-PSK
(AES),
WPA2-PSK
(AES)
AES is a security technology
that uses an
advanced
security method distinct from WEP
and TKIP.
AES assures a higher security level than WEP or
TKIP.
Since communication
via the wireless LAN
function
is established
by radio waves, the
wireless signal may be susceptible
to
interception.
To protect wireless
communication,
this system supports various
security
functions. Be sure to correctly
configure
the security settings in accordance
with your network environment.
No Security
Although
you can easily make settings, anyone
can intercept wireless communication
or intrude
into your wireless network, even without any
sophisticated
tools. Keep in mind that there is a
risk of unauthorized
access or interception
of
data.
56u_

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Bdv-e880Bdv-t58Bdv-e580

Table of Contents