HP V6611AU, V6903TU, V6700 Protecting your Wlan, Use a wireless transmitter with built-in security

Page 20

Protecting your WLAN

Because the WLAN standard was designed with only limited security capabilities—basically to foil casual eavesdropping rather than more powerful forms of attack—it is essential to understand that WLANs are vulnerable to well-known and well-documented security weaknesses.

WLANs in public areas, or “hotspots,” like coffee shops and airports may not provide any security. New technologies are being developed by wireless manufacturers and hotspot service providers that make the public environment more secure and anonymous. If you are concerned about the security of your computer in a hotspot, limit your network activities to noncritical e-mail and basic Internet surfing.

When you set up a WLAN or access an existing WLAN, always enable security features to protect your network from unauthorized access. The common security levels are Wi-Fi Protected Access (WPA)- Personal and Wired Equivalent Privacy (WEP). Because wireless radio signals travel outside the network, other WLAN devices can pick up unprotected signals and either connect to your network (uninvited) or capture information being sent across it. However, you can take precautions to protect your WLAN:

Use a wireless transmitter with built-in security

Many wireless base stations, gateways, or routers provide built-in security features such as wireless security protocols and firewalls. With the correct wireless transmitter, you can protect your network from the most common wireless security risks.

Work behind a firewall

A firewall is a barrier that checks both data and requests for data that are sent to your network, and discards any suspicious items. Firewalls are available in many varieties, both software and hardware. Some networks use a combination of both types.

Use wireless encryption

A variety of sophisticated encryption protocols is available for your WLAN. Find the solution that works best for your network security:

Wired Equivalent Privacy (WEP) is a wireless security protocol that encodes or encrypts all network data before it is transmitted using a WEP key. Usually, you can allow the network to assign the WEP key. Alternatively, you can set up your own key, generate a different key, or choose other advanced options. Without the correct key, others will not be able to use the WLAN.

WPA (Wi-Fi Protected Access), like WEP, uses security settings to encrypt and decrypt data that is transmitted over the network. However, instead of using one static security key for encryptions as WEP does, WPA uses “temporal key integrity protocol” (TKIP) to dynamically generate a new key for every packet. It also generates different sets of keys for each computer on the network.

Close your network

If possible, prevent your network name (SSID) from being broadcast by the wireless transmitter. Most networks initially broadcast the name, telling any computer nearby that your network is available. By closing the network, other computers are less likely to know that your network exists.

NOTE: If your network is closed and the SSID is not broadcast, you will need to know or remember the SSID to connect new devices to the network. Write down the SSID and store it in a secure place before closing the network.

14 Chapter 2 Setting up a WLAN (select models only)

Image 20 Contents
Wireless Select Models Only Page Product notice Iv Product notice Table of contents Page Using wireless devices select models only Identifying wireless and network status icons Icon Name DescriptionUsing the wireless controls Using the wireless button Using Wireless Assistant software select models only Click Properties Wireless Assistant ApplyUsing operating system controls Setting up a Wlan select models only Determining wireless hardware requirements Preparing the router and the computer Launching Network Assistant Configuring router settings Configuring wireless device settings Saving and using the wireless setup package Use a wireless transmitter with built-in security Protecting your WlanUsing a Wlan Connecting to a Wlan Select Start Connect toRoaming to another network Using HP Broadband Wireless select models only Using Bluetooth wireless devices select models only Bluetooth and Internet Connection Sharing ICS Troubleshooting wireless connection problems Cannot connect to a Wlan Select Start Computer System propertiesCannot launch Wlan Network status icon is not displayed Current network security codes are unavailable Wlan connection is very weak Cannot connect to the wireless router Cannot connect to a wireless network used previously Index Icons
Related manuals
Manual 12 pages 43.08 Kb Manual 8 pages 26.72 Kb Manual 15 pages 30.84 Kb Manual 20 pages 63 b Manual 146 pages 39.46 Kb Manual 14 pages 39.67 Kb Manual 36 pages 44.32 Kb Manual 15 pages 61.27 Kb Manual 12 pages 12.23 Kb Manual 29 pages 2.66 Kb Manual 18 pages 14.37 Kb Manual 22 pages 35.82 Kb Manual 12 pages 52.66 Kb Manual 11 pages 55.02 Kb Manual 10 pages 11.88 Kb Manual 18 pages 21.97 Kb Manual 21 pages 62.88 Kb Manual 18 pages 41.39 Kb Manual 29 pages 58.06 Kb Manual 12 pages 14.06 Kb Manual 19 pages 51.37 Kb Manual 148 pages 23.09 Kb Manual 24 pages 18.91 Kb Manual 18 pages 61.79 Kb Manual 12 pages 7.68 Kb Manual 28 pages 55.55 Kb Manual 14 pages 28.88 Kb Manual 18 pages 9.48 Kb Manual 18 pages 22.84 Kb Manual 29 pages 55.68 Kb Manual 31 pages 36.31 Kb Manual 13 pages 44.05 Kb