Hp EliteBook 8740w Mobile Workstation User Manual Page 30

  • Download
  • Add to my manuals
  • Print
  • Page
    / 148
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 29
A variety of sophisticated encryption protocols is available for your WLAN. Find the solution that
works best for your network security:
Wired Equivalent Privacy (WEP) is a wireless security protocol that uses a WEP key to
encode or encrypt all network data before it is transmitted. Usually, you can allow the network
to assign the WEP key. Alternatively, you can set up your own key, generate a different key,
or choose other advanced options. Without the correct key, others will not be able to use the
WLAN.
WPA (Wi-Fi Protected Access), like WEP, uses security settings to encrypt and decrypt data
that is transmitted over the network. However, instead of using one static security key for
encryptions as WEP does, WPA uses
temporal key integrity protocol
(TKIP) to dynamically
generate a new key for every packet. It also generates different sets of keys for each computer
on the network.
Close your network.
If possible, prevent your network name (SSID) from being broadcast by the wireless transmitter.
Most networks initially broadcast the name, telling any computer nearby that your network is
available. By closing the network, other computers are less likely to know that your network exists.
NOTE: If your network is closed and the SSID is not broadcast, you will need to know or remember
the SSID to connect new devices to the network. Write down the SSID and store it in a secure
place before closing the network.
Connecting to a WLAN
To connect to the WLAN, follow these steps:
1. Be sure that the WLAN device is on. If it is on, the wireless lights are on (blue). If the wireless lights
are amber, press the wireless button.
2. Select Start > Connect To.
3. Select your WLAN from the list, and then type the network security key, if required.
If the network is unsecured, meaning that anyone can access the network, a warning is
displayed. Click Connect Anyway to accept the warning and complete the connection.
If the network is a security-enabled WLAN, you are prompted to enter a network security key,
which is a security code. Type the code, and then click Connect to complete the connection.
NOTE: If no WLANs are listed, you are out of range of a wireless router or access point.
NOTE: If you do not see the network you want to connect to, click Show all connections. A list
of options will appear that includes creating a new network connection, as well as troubleshooting
connection issues.
After the connection is made, place the mouse pointer over the network status icon in the notification
area, at the far right of the taskbar, to verify the name and status of the connection.
NOTE: The functional range (how far your wireless signals travel) depends on WLAN implementation,
router manufacturer, and interference from other electronic devices or structural barriers such as walls
and floors.
More information about using a WLAN is available through the following resources:
Information from your ISP and the manufacturer's instructions included with your wireless router
and other WLAN equipment
Information and Web site links provided in Help and Support
18 Chapter 2 Wireless, modem, and local area network
Page view 29
1 2 ... 25 26 27 28 29 30 31 32 33 34 35 ... 147 148

Comments to this Manuals

No comments