User's Manual

Table Of Contents
NOTE: Using dial-up or wireless networks to access a corporate network, e-mail, or other wireless
communications, such as Bluetooth devices, might require separate hardware together with a Wi-Fi
infrastructure and a service contract.
Check with your service provider for the availability of network coverage in your area. Not all Web content
might be available. Some Web content might require installation of additional software.
Wi-Fi terms
Become familiar with the following terms as you begin to use Wi-Fi.
Term Definition
802.11 standard An approved standard specification of radio technology from the Institute of Electrical and
Electronics Engineers (IEEE) used for wireless local area networks (Wi-Fi).
Device-to-computer or ad-hoc A mode that does not use access points. It provides independent peer-to-peer connectivity in
a wireless LAN.
Domain Name System (DNS) The way that Internet domain names are located and translated into IP addresses. It is an
easy name to remember for an Internet address. Every Web site has its own specific IP
address on the Internet.
Encryption An alphanumeric (letters and numbers) conversion process of data primarily used for
protection against any unauthorized access.
Hotspots Public or private areas where you can access Wi-Fi service. These wireless connections can
be located, for example, at a library, cyber cafe, hotel, airport lounge, or convention center.
This service can be free or sometimes requires a fee.
Infrastructure This connection mode uses wireless access points to connect to networks.
WEP Wired Equivalent Privacy (WEP) is an encryption standard defined by the IEEE 802.11
committee and is used for security in wireless connections.
EAP Extensible Authentication Protocol (EAP) is an authentication protocol supporting various
authentication methods, such as traditional passwords, token cards, digital certificates, etc.
GTC Generic Token Card (GTC) carries user specific token cards for authentication. The main
feature in GTC is digital certificate/token card-based authentication.
WPA-PSK Wi-Fi Protected Access Pre-Shared Key (WPA-PSK) is used to secure Wi-Fi Connections
and provides better security than WEP.
TKIP Temporal Key Integrity Protocol (TKIP) is a security protocol used in WPA.
AES Advanced Encryption Standard (AES) is a next-generation encryption standard, used for
wireless networks.
WPA2-Personal (PSK) WPA2-Personal (PSK) is an enhanced version of WPA-PSK.
Tunnel PAC Tunnel Protected Access Credentials (PAC) is used to establish a secure EAP-FAST tunnel.
It also communicates server policies detailing the activities that can occur in the secure tunnel.
Mach. PAC Machine Protected Access Credentials (Mach. PAC) is used to obtain network access when
a user’s credentials are not available.
EAP-FAST EAP-Flexible Authentication Via Secure Tunneling (FAST) uses PAC (Protected Access
Credential) that is managed by an authentication server to provide security.
MSCHAP Microsoft Challenge-Handshake Authentication Protocol (MSCHAP) ensures a secure
connection between a client and a server by verifying the identity of the devices periodically.
LEAP Lightweight Extensible Authentication Protocol (LEAP) creates a secure wireless connection
with other devices that use Wired Equivalent Privacy.
Wi-Fi 75