You will need to configure the networks you want to connect to. Using your HP iPAQ, you must be
within the range of the access point to initiate network authentication. You will need your logon
credentials to access various networks: SSID, user name, password, and domain name. You will
then be able to select an available network from an on-screen list.
To get specific information about configuring and logging on to networks, refer to the documentation
that came with your HP iPAQ.
Virtual Private Network and Wired Equivalency Privacy
A virtual private network (VPN) allows two or more private networks to be connected over a publicly
accessed network. Primarily, a VPN connection helps you to securely connect to servers (such as a
corporate network) via the Internet. In a sense, VPNs are similar to WANs or a securely encrypted
tunnel. The key feature of VPNs is that they can use public networks like the Internet rather than
rely on expensive, privately leased lines.
Additionally, VPNs have the same security and encryption features as private networks. To learn
more about setting up and connecting to a VPN, refer to the documentation on the
or Getting Started
CD that came with your HP iPAQ.
Wired Equivalency Privacy (WEP) encrypts data immediately before wireless transmissions are
sent, and decrypts data it receives. WEP is a security protocol designed to provide a wireless local
area network (WLAN) with the same level of security usually expected on a local area network
(LAN). Basically, WLAN is a wireless network in which a mobile user can connect to a local area
network through a wireless connection.
WEP security is considered the first significant line of defense against casual eavesdroppers. If
WEP uses a secret key, which is considered similar to a password, then the key must be available
on all of the network's wireless devices. WEP is intended to provide wireless users with the same
level of privacy as users in a wired network environment.
Public wireless connections such as hotspots can be somewhat insecure. (Hotspots are public or
private areas where a wireless access point is available. For example, this wireless connection can
be located at a library or coffee house.)
Temporal Key Integrity Protocol (TKIP) technology improves WEP by using a per-packet key
mechanism, in which the base key is modified for each packet sent over the network. The overall
key length is extended to 256 bits for encryption.
To obtain device-specific instructions on how to create, change, and start a VPN connection using
your HP iPAQ, refer to the documentation that came with your device.
To get specific information about turning on or off WLAN and Wi-Fi, refer to the documentation on
CD that came with your device.
Wi-Fi Protected Access (WPA) and TKIP/AES
Wi-Fi Protected Access (WPA) works with 802.11, and it secures a wireless network environment.
WPA is intended to replace the current, less secure WEP system which is part of the Electrical and
Electronic Engineers (IEEE) 802.11i standard.
WPA technology enables a practical, economical solution to wireless LAN security. WPA is also a
strong encryption solution for wireless network security—especially while users roam from access
point to access point.