HP MT40 User's Guide Page 41

  • Download
  • Add to my manuals
  • Print
  • Page
    / 82
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 40
Connecting to a WLAN
To connect to a WLAN, follow these steps:
1. Verify that the WLAN device is turned on. If it is on, the wireless light is white. If the wireless light
is amber, press the wireless button.
2. Open Network Connections by selecting Start > Control Panel > Network and Sharing
Center.
NOTE: You must commit these changes in order for them to be saved. For additional information,
refer to
HP Write Filters on page 3.
NOTE: The functional range (how far your wireless signals travel) depends on WLAN
implementation, router manufacturer, and interference from other electronic devices or structural
barriers such as walls and floors.
More information about using a WLAN is available through your ISP and the user guide included with
your wireless router and other WLAN equipment.
For a list of public WLANs near you, contact your ISP or search the Web. Web sites that list public
WLANs include Cisco Internet Mobile Office Wireless Locations, Hotspotlist, and Geektools. Check
with each public WLAN location for cost and connection requirements.
Using wireless security features
When you set up a WLAN or access an existing WLAN, always enable security features to protect
your network from unauthorized access. The most common security levels are Wi-Fi Protected
Access (WPA)-Personal and Wired Equivalent Privacy (WEP).
When setting up a network, use one or more of the following security measures:
Wireless encryption—Your computer supports three encryption protocols:
Wi-Fi Protected Access (WPA)
Wi-Fi Protected Access II (WPA2)
Wired Equivalent Privacy (WEP)
NOTE: HP recommends that you select WPA2, which is the most advanced of the three encryption
protocols. The use of WEP encryption is not recommended, because it can be overcome with little
effort.
Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) use security standards to
encrypt and decrypt data transmitted over the network. Both WPA and WPA2 dynamically
generate a new key for every packet, and they also generate a different set of keys for each
computer on the network. To accomplish this:
WPA uses Advanced Encryption Standard (AES) and Temporal Key Integrity Protocol
(TKIP).
WPA2 uses Cipher Block Chaining Message Authentication Code Protocol (CCMP), which
is a new AES protocol.
Wired Equivalent Privacy (WEP) encrypts data with a WEP key before it is transmitted. Without
the correct key, others will not be able to use the WLAN.
Using WLAN 31
Page view 40
1 2 ... 36 37 38 39 40 41 42 43 44 45 46 ... 81 82

Comments to this Manuals

No comments