Network Connections
You will need to configure the networks you want to connect to. Using your HP iPAQ, you must be within the range of the access point to initiate network authentication. You will need your logon credentials to access various networks: SSID, user name, password, and domain name. You will then be able to select an available network from an
To get specific information about configuring and logging on to networks, refer to the documentation that came with your HP iPAQ.
Virtual Private Network and Wired Equivalency Privacy
A virtual private network (VPN) allows two or more private networks to be connected over a publicly accessed network. Primarily, a VPN connection helps you to securely connect to servers (such as a corporate network) via the Internet. In a sense, VPNs are similar to WANs or a securely encrypted tunnel. The key feature of VPNs is that they can use public networks like the Internet rather than rely on expensive, privately leased lines.
Additionally, VPNs have the same security and encryption features as private networks. To learn more about setting up and connecting to a VPN, refer to the documentation on the Companion CD or Getting Started CD that came with your HP iPAQ.
Wired Equivalency Privacy (WEP) encrypts data immediately before wireless transmissions are sent, and decrypts data it receives. WEP is a security protocol designed to provide a wireless local area network (WLAN) with the same level of security usually expected on a local area network (LAN). Basically, WLAN is a wireless network in which a mobile user can connect to a local area network through a wireless connection.
WEP security is considered the first significant line of defense against casual eavesdroppers. If WEP uses a secret key, which is considered similar to a password, then the key must be available on all of the network’s wireless devices. WEP is intended to provide wireless users with the same level of privacy as users in a wired network environment.
Public wireless connections such as hotspots can be somewhat insecure. (Hotspots are public or private areas where a wireless access point is available. For example, this wireless connection can be located at a library or coffee house.)
Temporal Key Integrity Protocol (TKIP) technology improves WEP by using a
To obtain
To get specific information about turning on or off WLAN and
Wi-Fi Protected Access (WPA) and TKIP/AES
WPA technology enables a practical, economical solution to wireless LAN security. WPA is also a strong encryption solution for wireless network
6