HP Pavilion g4-2000 User Guide HP Notebook - Windows 7 - Page 30

Protecting your WLAN, Roaming to another network, Firewall, Wireless encryption

Page 30 highlights

Protecting your WLAN When you set up a WLAN or access an existing WLAN, always enable security features to protect your network from unauthorized access. WLANs in public areas (hotspots) like coffee shops and airports may not provide any security. If you are concerned about the security of your computer in a hotspot, limit your network activities to e-mail that is not confidential and basic Internet surfing. Wireless radio signals travel outside the network, so other WLAN devices can pick up unprotected signals. You can take the following precautions to protect your WLAN: ● Firewall-A firewall checks both data and requests for data that are sent to your network, and discards any suspicious items. Firewalls are available in both software and hardware. Some networks use a combination of both types. ● Wireless encryption-Your computer supports three encryption protocols: ◦ Wi-Fi Protected Access (WPA) ◦ Wi-Fi Protected Access II (WPA2) ◦ Wired Equivalent Privacy (WEP) NOTE: HP recommends that you select WPA2, which is the most advanced of the three encryption protocols. The use of WEP encryption is not recommended, because it can be overcome with little effort. ● Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) use security standards to encrypt and decrypt data transmitted over the network. Both WPA and WPA2 dynamically generate a new key for every packet, and they also generate a different set of keys for each computer network. To accomplish this: ◦ WPA uses Advanced Encryption Standard (AES) and Temporal Key Integrity Protocol (TKIP) ◦ WPA2 uses Cipher Block Chaining Message Authentication Code Protocol (CCMP), which is a new AES protocol. ● Wired Equivalent Privacy (WEP) encrypts data with a WEP key before it is transmitted. Without the correct key, others will not be able to use the WLAN. Roaming to another network When you move your computer within range of another WLAN, Windows attempts to connect to that network. If the attempt is successful, your computer is automatically connected to the new network. If Windows does not recognize the new network, follow the same procedure you used initially to connect to your WLAN. 20 Chapter 3 Networking

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121

Protecting your WLAN
When you set up a WLAN or access an existing WLAN, always enable security features to protect
your network from unauthorized access. WLANs in public areas (hotspots) like coffee shops and
airports may not provide any security. If you are concerned about the security of your computer in a
hotspot, limit your network activities to e-mail that is not confidential and basic Internet surfing.
Wireless radio signals travel outside the network, so other WLAN devices can pick up unprotected
signals. You can take the following precautions to protect your WLAN:
Firewall
—A firewall checks both data and requests for data that are sent to your network, and
discards any suspicious items. Firewalls are available in both software and hardware. Some
networks use a combination of both types.
Wireless encryption
—Your computer supports three encryption protocols:
Wi-Fi Protected Access (WPA)
Wi-Fi Protected Access II (WPA2)
Wired Equivalent Privacy (WEP)
NOTE:
HP recommends that you select WPA2, which is the most advanced of the three encryption
protocols. The use of WEP encryption is not recommended, because it can be overcome with little
effort.
Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) use security standards to
encrypt and decrypt data transmitted over the network. Both WPA and WPA2 dynamically
generate a new key for every packet, and they also generate a different set of keys for each
computer network. To accomplish this:
WPA uses Advanced Encryption Standard (AES) and Temporal Key Integrity Protocol
(TKIP)
WPA2 uses Cipher Block Chaining Message Authentication Code Protocol (CCMP), which
is a new AES protocol.
Wired Equivalent Privacy (WEP) encrypts data with a WEP key before it is transmitted. Without
the correct key, others will not be able to use the WLAN.
Roaming to another network
When you move your computer within range of another WLAN, Windows attempts to connect to that
network. If the attempt is successful, your computer is automatically connected to the new network. If
Windows does not recognize the new network, follow the same procedure you used initially to
connect to your WLAN.
20
Chapter 3
Networking