HP G56-125NR HP Notebook User Guide - SuSE Linux - Page 26

Protecting your WLAN, Roaming to another network, Firewall, Wireless encryption

Page 26 highlights

For help in setting up your WLAN, refer to the information provided by your router manufacturer or your ISP. Protecting your WLAN When you set up a WLAN or access an existing WLAN, always enable security features to protect your network from unauthorized access. WLANs in public areas (hotspots) like coffee shops and airports may not provide any security. If you are concerned about the security of your computer in a hotspot, limit your network activities to e-mail that is not confidential and basic Internet surfing. Wireless radio signals travel outside the network, so other WLAN devices can pick up unprotected signals. You can take the following precautions to protect your WLAN: ● Firewall-Checks both data and requests for data that are sent to your network, and discards any suspicious items. Firewalls are available in both software and hardware. Some networks use a combination of both types. ● Wireless encryption-Wi-Fi Protected Access (WPA and WPA2) encrypts and decrypts data transmitted over the network. WPA uses Temporal Key Integrity Protocol (TKIP) to dynamically generate a new key for every packet. It also generates different sets of keys for each computer on the network. Wired Equivalent Privacy (WEP) encrypts data before it is transmitted using a WEP key. Without the correct key, others will not be able to use the WLAN. Roaming to another network When you move your computer within range of another WLAN, the operating system attempts to connect to that network. If the attempt is successful, your computer is automatically connected to the new network. If the operating system does not recognize the new network, follow the same procedure you used initially to connect to your WLAN. 18 Chapter 3 Networking

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80

For help in setting up your WLAN, refer to the information provided by your router manufacturer or your
ISP.
Protecting your WLAN
When you set up a WLAN or access an existing WLAN, always enable security features to protect your
network from unauthorized access. WLANs in public areas (hotspots) like coffee shops and airports
may not provide any security. If you are concerned about the security of your computer in a hotspot,
limit your network activities to e-mail that is not confidential and basic Internet surfing.
Wireless radio signals travel outside the network, so other WLAN devices can pick up unprotected
signals. You can take the following precautions to protect your WLAN:
Firewall
—Checks both data and requests for data that are sent to your network, and discards any
suspicious items. Firewalls are available in both software and hardware. Some networks use a
combination of both types.
Wireless encryption
—Wi-Fi Protected Access (WPA and WPA2) encrypts and decrypts data
transmitted over the network. WPA uses Temporal Key Integrity Protocol (TKIP) to dynamically
generate a new key for every packet. It also generates different sets of keys for each computer on
the network. Wired Equivalent Privacy (WEP) encrypts data before it is transmitted using a WEP
key. Without the correct key, others will not be able to use the WLAN.
Roaming to another network
When you move your computer within range of another WLAN, the operating system attempts to connect
to that network. If the attempt is successful, your computer is automatically connected to the new
network. If the operating system does not recognize the new network, follow the same procedure you
used initially to connect to your WLAN.
18
Chapter 3
Networking