HP ProBook 6550b HP ProBook User Guide - Windows 7 - Page 36

Connecting to a WLAN, Wired Equivalent Privacy WEP - manual

Page 36 highlights

When you set up a WLAN or access an existing WLAN, always enable security features to protect your network from unauthorized access. The common security levels are Wi-Fi Protected Access (WPA) and Wired Equivalent Privacy (WEP). Because wireless radio signals travel outside the network, other WLAN devices can pick up unprotected signals and either connect to your network (uninvited) or capture information being sent across it. However, you can take precautions to protect your WLAN: ● Use a wireless transmitter with built-in security. Many wireless base stations, gateways, and routers provide built-in security features such as wireless security protocols and firewalls. With the correct wireless transmitter, you can protect your network from the most common wireless security risks. ● Work behind a firewall. A firewall is a barrier that checks both data and requests for data that are sent to your network and then discards any suspicious items. Firewalls are available in many varieties, both software and hardware. Some networks use a combination of both types. ● Use wireless encryption. A variety of sophisticated encryption protocols is available for your WLAN. Find the solution that works best for your network security: ◦ Wired Equivalent Privacy (WEP) is a wireless security protocol that uses a WEP key to encode or encrypt all network data before it is transmitted. Usually, you can allow the network to assign the WEP key. Alternatively, you can set up your own key, generate a different key, or choose other advanced options. Without the correct key, others will not be able to use the WLAN. ◦ WPA (Wi-Fi Protected Access), like WEP, uses security settings to encrypt and decrypt data that is transmitted over the network. However, instead of using one static security key for encryptions as WEP does, WPA uses temporal key integrity protocol (TKIP) to dynamically generate a new key for every packet. It also generates different sets of keys for each computer on the network. Connecting to a WLAN To connect to the WLAN, follow these steps: 1. Be sure that the WLAN device is on. If it is on, the wireless lights are on (blue). If the wireless lights are amber, press the wireless button. 2. Click the network icon in the notification area, at the far right of the taskbar. 3. Select your WLAN from the list. 4. Click Connect. If the network is a security-enabled WLAN, you are prompted to enter a network security key, which is a security code. Type the code, and then click OK to complete the connection. NOTE: If no WLANs are listed, you are out of range of a wireless router or access point. NOTE: If you do not see the network you want to connect to, click Open Network and Sharing Center, and then click Set up a new connection or network. A list of options is displayed. You can choose to manually search for and connect to a network or to set up a new network connection. 26 Chapter 2 Wireless, modem, and local area network

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181

When you set up a WLAN or access an existing WLAN, always enable security features to protect your
network from unauthorized access. The common security levels are Wi-Fi Protected Access (WPA) and
Wired Equivalent Privacy (WEP). Because wireless radio signals travel outside the network, other WLAN
devices can pick up unprotected signals and either connect to your network (uninvited) or capture
information being sent across it. However, you can take precautions to protect your WLAN:
Use a wireless transmitter with built-in security
.
Many wireless base stations, gateways, and routers provide built-in security features such as
wireless security protocols and firewalls. With the correct wireless transmitter, you can protect your
network from the most common wireless security risks.
Work behind a firewall
.
A firewall is a barrier that checks both data and requests for data that are sent to your network and
then discards any suspicious items. Firewalls are available in many varieties, both software and
hardware. Some networks use a combination of both types.
Use wireless encryption
.
A variety of sophisticated encryption protocols is available for your WLAN. Find the solution that
works best for your network security:
Wired Equivalent Privacy (WEP)
is a wireless security protocol that uses a WEP key to
encode or encrypt all network data before it is transmitted. Usually, you can allow the network
to assign the WEP key. Alternatively, you can set up your own key, generate a different key,
or choose other advanced options. Without the correct key, others will not be able to use the
WLAN.
WPA (Wi-Fi Protected Access)
, like WEP, uses security settings to encrypt and decrypt data
that is transmitted over the network. However, instead of using one static security key for
encryptions as WEP does, WPA uses
temporal key integrity protocol
(TKIP) to dynamically
generate a new key for every packet. It also generates different sets of keys for each computer
on the network.
Connecting to a WLAN
To connect to the WLAN, follow these steps:
1.
Be sure that the WLAN device is on. If it is on, the wireless lights are on (blue). If the wireless lights
are amber, press the wireless button.
2.
Click the network icon in the notification area, at the far right of the taskbar.
3.
Select your WLAN from the list.
4.
Click
Connect
.
If the network is a security-enabled WLAN, you are prompted to enter a network security key, which
is a security code. Type the code, and then click
OK
to complete the connection.
NOTE:
If no WLANs are listed, you are out of range of a wireless router or access point.
NOTE:
If you do not see the network you want to connect to, click
Open Network and Sharing
Center
, and then click
Set up a new connection or network
. A list of options is displayed. You
can choose to manually search for and connect to a network or to set up a new network connection.
26
Chapter 2
Wireless, modem, and local area network