
setup Finish
Chapter 4
(continued)
Parameter | Description | ||
|
|
|
|
| number. Value is from 1 to 14; countries/regions might limit the range of | ||
| approved channels. | ||
| • (number): Value ranging from 1 to 14, depending on country/region. | ||
| • None: No channel is in use. | ||
| • Not Applicable: The WLAN is disabled or this parameter does not apply | ||
|
| to this network type. | |
|
|
|
|
| NOTE: In ad hoc mode, if you are not able to receive or transmit data | ||
| between your computer and the HP | ||
| the same communication channel on your computer and the HP | ||
| In infrastructure mode, the channel is dictated by the access point. | ||
|
|
|
|
Authentication | Type of authentication in use: | ||
type | • None: No authentication in use. | ||
| |||
| • Open System (ad hoc and infrastructure): No authentication | ||
| • Shared Key: WEP key is required. | ||
| • | ||
| • Not applicable: This parameter does not apply to this network type. | ||
| Authentication verifies the identity of a user or device before granting access | ||
| to the network, making it more difficult for unauthorized users to access | ||
| network resources. This security method is common on wireless networks. | ||
| A network using Open System authentication does not screen network users | ||
| based on their identities. Any wireless user can have access from the network. | ||
| However, such a network might use WEP (Wired Equivalent Privacy) | ||
| encryption to provide a first level of security against casual eavesdroppers. | ||
| A network using Shared Key authentication provides increased security by | ||
| requiring users or devices to identify themselves with a static key (a | ||
| hexadecimal or alphanumeric string). Every user or device on the network | ||
| shares the same key. WEP encryption is used along with shared key | ||
| authentication, using the same key for both authentication and encryption. | ||
| A network using | ||
| significantly stronger security, and is supported in most wireless access | ||
| points and wireless routers. The access point or router verifies the identity of | ||
| a user or device requesting access to the network before granting that access. | ||
| Several different authentication protocols might be used on an authentication | ||
| server. | ||
|
| ||
Encryption | The type of encryption in use on the network: | ||
| • None: No encryption is in use. | ||
| • | ||
| • | ||
| • | ||
|
| an encryption algorithm for securing sensitive but unclassified material | |
|
| by US Government agencies. | |
| • | ||
|
| protocol, is in use. | |
| • Automatic: AES or TKIP is in use. | ||
| • Not applicable: This parameter does not apply to this network type. | ||
| WEP aims to provide security by encrypting data over radio waves so that it | ||
| is protected as it is transmitted from one end point to another. This security | ||
| method is common on wireless networks. |
58 Finish setting up the HP