User's Manual

Table Of Contents
Term Definition
EAP Extensible Authentication Protocol (EAP) is an authentication protocol supporting various
authentication methods, such as traditional passwords, token cards, digital certificates, etc.
GTC Generic Token Card (GTC) carries user specific token cards for authentication. The main
feature in GTC is digital certificate/token card-based authentication.
WPA-PSK Wi-Fi Protected Access Pre-Shared Key (WPA-PSK) is used to secure Wi-Fi Connections
and provides better security than WEP.
TKIP Temporal Key Integrity Protocol (TKIP) is a security protocol used in WPA.
AES Advanced Encryption Standard (AES) is a next-generation encryption standard, used for
wireless networks.
WPA2-Personal (PSK) WPA2-Personal (PSK) is an enhanced version of WPA-PSK.
Tunnel PAC Tunnel Protected Access Credentials (PAC) is used to establish a secure EAP-FAST tunnel.
It also communicates server policies detailing the activities that can occur in the secure tunnel.
Mach. PAC Machine Protected Access Credentials (Mach. PAC) is used to obtain network access when
a user’s credentials are not available.
EAP-FAST EAP-Flexible Authentication Via Secure Tunneling (FAST) uses PAC (Protected Access
Credential) that is managed by an authentication server to provide security.
MSCHAP Microsoft Challenge-Handshake Authentication Protocol (MSCHAP) ensures a secure
connection between a client and a server by verifying the identity of the devices periodically.
LEAP Lightweight Extensible Authentication Protocol (LEAP) creates a secure wireless connection
with other devices that use Wired Equivalent Privacy.
PEAP Protected Extensible Authentication Protocol (PEAP) creates a secure tunnel between client
and server devices using digital certificates.
TLS Transport Layer Security (TLS) uses data encryption and provides a secure connection
between a client and a server over the Internet.
TTLS Tunneled Transport Layer Security (TTLS) creates a secure tunnel between devices using
passwords on the client device and digital certificates on the server.
MD5 Message-Digest algorithm 5 (MD5) is a method used to encrypt data.
CCKM Cisco Centralized Key Management (CCKM) allows secure reconnection of a mobile device
when you move from one access point to another.
Open Wi-Fi settings
Access Wi-Fi settings to add, edit, and delete Wi-Fi connections on your HP iPAQ.
To open Wi-Fi settings:
1. Press the Wireless Manager link on the Home screen or press Start > Settings > Connections
> Wireless Manager.
2. Press Menu > Wi-Fi Settings.
Automatically connect to a Wi-Fi network
When you try to connect to a Wi-Fi network, the HP iPAQ automatically detects the available Wi-Fi
networks that are broadcasting their signal. If your Wi-Fi network is not set to broadcast, then you have
to connect to it manually. While trying to connect to a Wi-Fi network if authentication is required, contact
your network administrator for the details and enter the authentication information correctly.
76 Chapter 13 Connections