Compaq tc1100 Wireless Security

Compaq tc1100 Manual

Compaq tc1100 manual content summary:

  • Compaq tc1100 | Wireless Security - Page 1
    Wireless Security Executive Summary ...2 Problem Statement ...2 Historical information/background...2 Mobile Device Security and HP Protect Tools 3 Wired Equivalent Privacy...4 Wi-Fi Protected Access ...5 WPA Pre-Shared Key...6 IEEE 802.11i ...6 Emerging Mobile Applications ...7 Virtual Private
  • Compaq tc1100 | Wireless Security - Page 2
    notebook and handheld PCs) with HP Wi-Fi and other mobile connectivity solutions. A secure solution enables a mobile worker to gain safe network access in areas where it is traditionally hard to deploy "wired" networks. It also enables such services as wireless access for CRM Data, file and database
  • Compaq tc1100 | Wireless Security - Page 3
    • Extensibility: solutions must adapt as security needs grow and newer technologies and features become available • Services: implementation support to assist the customer in enabling product-based security attributes is often expensive and complex The HP ProtectTools Security Manager is
  • Compaq tc1100 | Wireless Security - Page 4
    , all HP devices will support Wi-Fi Protected Access, and the high-level authentication provided by 802.1x Enhanced Authorization Protocol. Also, these devices support TKIP and AES Encryption. We are focused on what is available today, as it is hard to predict future changes in wireless technologies
  • Compaq tc1100 | Wireless Security - Page 5
    management frames on 802.11 Wireless LANs are always sent in the clear, this mode of operation does not provide adequate security Limiting propagation is hard, although it is possible in certain environments Wi-Fi Protected Access Fortunately, the Wi-Fi Protected Access (WPA) subset of the 802
  • Compaq tc1100 | Wireless Security - Page 6
    The following screen shots show available WPA authentication and encryption supported on HP notebook PCs. WPA Pre-Shared Key While WPA and 802.11i allow EAP Authentication, this solution may not be affordable or available for home users. In addition, home users don't typically have access to an
  • Compaq tc1100 | Wireless Security - Page 7
    HP Notebooks with WPA2 Certification are available Emerging Mobile Applications The rise of the Internet and wireless connectivity increased the demand for security and pervasive access problem since 1980, and can provide more robust security to mail, database and web servers. The HP solution
  • Compaq tc1100 | Wireless Security - Page 8
    Socket layer (SSL) or Data Encryption Standard (DES). AES is proving to be the optimal encryption for mobile devices, due to its low requirements of memory and CPU processing power. This has a huge impact on mobility in terms of battery life, time, price and total customer experience. 8
  • Compaq tc1100 | Wireless Security - Page 9
    certified HP products interoperating with unique features of Cisco wireless LAN infrastructure As wireless LAN security improves over time, users will continue to find stronger data protection and user authentication, as well as improved interoperability. Microsoft Windows XP Service Pack 2 offers
  • Compaq tc1100 | Wireless Security - Page 10
    implementing wireless solutions by remembering that standards-based wireless network security plus HP HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10

1
Wireless Security
Executive Summary
..............................................................................................................................
2
Problem Statement
...............................................................................................................................
2
Historical information/background
.....................................................................................................
2
Mobile Device Security and HP Protect Tools
...........................................................................................
3
Wired Equivalent Privacy
......................................................................................................................
4
Wi-Fi Protected Access
.........................................................................................................................
5
WPA Pre-Shared Key
........................................................................................................................
6
IEEE 802.11i
......................................................................................................................................
6
Emerging Mobile Applications
..............................................................................................................
7
Virtual Private Network vs. Reverse Proxy
...............................................................................................
8
Conclusion
..........................................................................................................................................
9
For more information
..........................................................................................................................
10