Compaq nc8000 Wireless Security

Compaq nc8000 - Notebook PC Manual

Compaq nc8000 manual content summary:

  • Compaq nc8000 | Wireless Security - Page 1
    Wireless Security Executive Summary ...2 Problem Statement ...2 Historical information/background...2 Mobile Device Security and HP Protect Tools 3 Wired Equivalent Privacy...4 Wi-Fi Protected Access ...5 WPA Pre-Shared Key...6 IEEE 802.11i ...6 Emerging Mobile Applications ...7 Virtual Private
  • Compaq nc8000 | Wireless Security - Page 2
    using mobile devices (such as notebook and handheld PCs) with HP Wi-Fi and other mobile connectivity solutions. A secure solution enables a mobile worker to gain safe network access in areas where it is traditionally hard to deploy "wired" networks. It also enables such services as wireless access
  • Compaq nc8000 | Wireless Security - Page 3
    the task of making client devices secure. Client device security options feature a number of capabilities based on a variety of technologies: • Notebook and desktop computers can be configured with Smart Card readers. • Handheld devices now offer integrated biometric readers and incorporate security
  • Compaq nc8000 | Wireless Security - Page 4
    , all HP devices will support Wi-Fi Protected Access, and the high-level authentication provided by 802.1x Enhanced Authorization Protocol. Also, these devices support TKIP and AES Encryption. We are focused on what is available today, as it is hard to predict future changes in wireless technologies
  • Compaq nc8000 | Wireless Security - Page 5
    Service Set Identifier (SSID) is not a valid security measure. Because management frames on 802.11 Wireless Protocol) based authentication to Supports mutual authentication for stronger network access control. Previous methods authenticated the device, but not the source, for less security • Supports
  • Compaq nc8000 | Wireless Security - Page 6
    supported on HP notebook , most available consumer devices offer authentication within the device with a WPA pre produce a detailed specification to enhance the security features for wireless LANs. The based, in addition to other EAP types. HP products are focused on delivering "out-of-the-box" support
  • Compaq nc8000 | Wireless Security - Page 7
    use of Advanced Encryption Standard (AES) • Supports roaming Issues • An extra hardware upgrade is required, in order to implement AES. • *Products are not widely available (Products will carry WPA2 logo as a certification of 802.11i ) * HP Notebooks with WPA2 Certification are available Emerging
  • Compaq nc8000 | Wireless Security - Page 8
    firewall from the device to the back-end servers and web services - such as Microsoft notebooks accessing wireless and mobile networks. Microsoft Exchange Server supports devices, due to its low requirements of memory and CPU processing power. This has a huge impact on mobility in terms of battery
  • Compaq nc8000 | Wireless Security - Page 9
    attests to certified HP products interoperating with unique features of Cisco wireless LAN infrastructure As wireless LAN security improves over time, users will continue to find stronger data protection and user authentication, as well as improved interoperability. Microsoft Windows XP Service Pack
  • Compaq nc8000 | Wireless Security - Page 10
    implementing wireless solutions by remembering that standards-based wireless network security plus HP HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10

1
Wireless Security
Executive Summary
..............................................................................................................................
2
Problem Statement
...............................................................................................................................
2
Historical information/background
.....................................................................................................
2
Mobile Device Security and HP Protect Tools
...........................................................................................
3
Wired Equivalent Privacy
......................................................................................................................
4
Wi-Fi Protected Access
.........................................................................................................................
5
WPA Pre-Shared Key
........................................................................................................................
6
IEEE 802.11i
......................................................................................................................................
6
Emerging Mobile Applications
..............................................................................................................
7
Virtual Private Network vs. Reverse Proxy
...............................................................................................
8
Conclusion
..........................................................................................................................................
9
For more information
..........................................................................................................................
10