(continued)
Parameter Description
number. Value is from 1 to 14; countries/regions might limit the range of approved channels.
•(number): Value ranging from 1 to 14, depending on country/region.
•None: No channel is in use.
•Not Applicable: The WLAN is disabled or this parameter does not apply to this network type.
NOTE: In ad hoc mode, if you are not able to receive or transmit data between your computer and the HP
Authentication | Type of authentication in use: |
type | • None: No authentication in use. |
| |
| • Open System (ad hoc and infrastructure): No authentication |
| • Shared Key: WEP key is required. |
| • |
| • Not applicable: This parameter does not apply to this network type. |
| Authentication verifies the identity of a user or product before granting access |
| to the network, making it more difficult for unauthorized users to access |
| network resources. This security method is common on wireless networks. |
| A network using Open System authentication does not screen network users |
| based on their identities. Any wireless user can have access from the network. |
| However, such a network might use WEP (Wired Equivalent Privacy) |
| encryption to provide a first level of security against casual eavesdroppers. |
| A network using Shared Key authentication provides increased security by |
| requiring users or products to identify themselves with a static key (a |
| hexadecimal or alphanumeric string). Every user or product on the network |
| shares the same key. WEP encryption is used along with shared key |
| authentication, using the same key for both authentication and encryption. |
| A network using |
| significantly stronger security, and is supported in most wireless access |
| points and wireless routers. The access point or router verifies the identity of |
| a user or product requesting access to the network before granting that |
| access. Several different authentication protocols might be used on an |
| authentication server. |
|
|
Encryption | The type of encryption in use on the network: |
| • None: No encryption is in use. |
| • |
| • |
| • |
| an encryption algorithm for securing sensitive but unclassified material |
| by US Government agencies. |
| • |
| protocol, is in use. |
| • Automatic: AES or TKIP is in use. |
| • Not applicable: This parameter does not apply to this network type. |
| WEP aims to provide security by encrypting data over radio waves so that it |
| is protected as it is transmitted from one end point to another. This security |
| method is common on wireless networks. |
Finish setup
Connect to a computer | 47 |