HP Pavilion dv7-4200 Notebook PC User Guide - Windows 7 - Page 27

Connecting to a WLAN, Connect, Open Network and Sharing, Center, Set up a new connection or network

Page 27 highlights

network, other WLAN devices can pick up unprotected signals and either connect to your network (uninvited) or capture information being sent across it. To protect the WLAN: ● Use a wireless transmitter with built-in security Many wireless base stations, gateways, or routers provide built-in security features such as wireless security protocols and firewalls. With the correct wireless transmitter, you can protect your network from the most common wireless security risks. ● Work behind a firewall A firewall is a barrier that checks both data and requests that are sent to the network, and discards any suspicious items. Firewalls are available in many varieties, both software and hardware. Some networks use a combination of both types. ● Use wireless encryption A variety of sophisticated encryption protocols is available for your WLAN. Find the solution that works best for your network security: ◦ Wired Equivalent Privacy (WEP) is a wireless security protocol that encodes or encrypts all network data before it is transmitted using a WEP key. The network assigns the WEP key, but you can set up your own key, generate a different key, or choose other advanced options. Without the correct key, others cannot access the WLAN. ◦ WPA (Wi-Fi Protected Access), like WEP, uses security settings to encrypt and decrypt data that is transmitted over the network. However, instead of using one static security key for encryptions as WEP does, WPA uses "temporal key integrity protocol" (TKIP) to dynamically generate a new key for every packet. It also generates different sets of keys for each computer on the network. Connecting to a WLAN To connect to the WLAN: 1. Be sure that the WLAN device is on. If it is on, the wireless light is illuminated white. If the wireless light is off, press the wireless key. NOTE: On some models, the wireless light is amber when all wireless devices are off. 2. Click the Network icon in the notification area at the far right of the taskbar. 3. Select your WLAN from the list. 4. Click Connect. NOTE: If no WLANs are listed, you are out of range of a wireless router or access point. ● If the network is a security-enabled WLAN, enter a network security key at the prompt, which is a security code, and then click OK to complete the connection. ● If you do not see the network you want to connect to, click Open Network and Sharing Center, and then click Set up a new connection or network. A list of options appears. Search for and connect to a network or to create a new network connection. After the connection is made, place the mouse pointer over the Network icon in the notification area to verify the name and status of the connection. Using a WLAN 17

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121

network, other WLAN devices can pick up unprotected signals and either connect to your network
(uninvited) or capture information being sent across it. To protect the WLAN:
Use a wireless transmitter with built-in security
Many wireless base stations, gateways, or routers provide built-in security features such as
wireless security protocols and firewalls. With the correct wireless transmitter, you can protect your
network from the most common wireless security risks.
Work behind a firewall
A firewall is a barrier that checks both data and requests that are sent to the network, and discards
any suspicious items. Firewalls are available in many varieties, both software and hardware. Some
networks use a combination of both types.
Use wireless encryption
A variety of sophisticated encryption protocols is available for your WLAN. Find the solution that
works best for your network security:
Wired Equivalent Privacy (WEP) is a wireless security protocol that encodes or encrypts all
network data before it is transmitted using a WEP key. The network assigns the WEP key,
but you can set up your own key, generate a different key, or choose other advanced options.
Without the correct key, others cannot access the WLAN.
WPA (Wi-Fi Protected Access), like WEP, uses security settings to encrypt and decrypt data
that is transmitted over the network. However, instead of using one static security key for
encryptions as WEP does, WPA uses “temporal key integrity protocol” (TKIP) to dynamically
generate a new key for every packet. It also generates different sets of keys for each computer
on the network.
Connecting to a WLAN
To connect to the WLAN:
1.
Be sure that the WLAN device is on. If it is on, the wireless light is illuminated white. If the wireless
light is off, press the wireless key.
NOTE:
On some models, the wireless light is amber when all wireless devices are off.
2.
Click the Network icon in the notification area at the far right of the taskbar.
3.
Select your WLAN from the list.
4.
Click
Connect
.
NOTE:
If no WLANs are listed, you are out of range of a wireless router or access point.
If the network is a security-enabled WLAN, enter a network security key at the prompt, which
is a security code, and then click
OK
to complete the connection.
If you do not see the network you want to connect to, click
Open Network and Sharing
Center
, and then click
Set up a new connection or network
. A list of options appears.
Search for and connect to a network or to create a new network connection.
After the connection is made, place the mouse pointer over the Network icon in the notification area to
verify the name and status of the connection.
Using a WLAN
17