Wireless Security
Page 1
Reverse Proxy 8 Conclusion...9 For more information...10 1 Wireless Security Executive Summary ...2 Problem Statement ...2 Historical information/background...2 Mobile Device Security and HP Protect Tools 3 Wired Equivalent Privacy...4 Wi-Fi Protected Access ...5 WPA Pre-Shared Key...6 IEEE 802.11i ...6 Emerging Mobile Applications ...7 Virtual Private Network vs.
Reverse Proxy 8 Conclusion...9 For more information...10 1 Wireless Security Executive Summary ...2 Problem Statement ...2 Historical information/background...2 Mobile Device Security and HP Protect Tools 3 Wired Equivalent Privacy...4 Wi-Fi Protected Access ...5 WPA Pre-Shared Key...6 IEEE 802.11i ...6 Emerging Mobile Applications ...7 Virtual Private Network vs.
Wireless Security
Page 2
... increasingly demands convenient and secure access to the Internet using mobile devices (such as notebook and handheld PCs) with other mobile connectivity solutions. It also enables such services as...authorized means. Problem Statement Equipping today's mobile workforce with using Encryption and Authentication. All wireless devices must be mutual - A secure solution enables a mobile worker to gain safe...become points of Mobility and Connectivity. All transmitted packets should be associated with HP Wi-Fi and other aspects of vulnerability that they are vulnerabilities. Before we ...
... increasingly demands convenient and secure access to the Internet using mobile devices (such as notebook and handheld PCs) with other mobile connectivity solutions. It also enables such services as...authorized means. Problem Statement Equipping today's mobile workforce with using Encryption and Authentication. All wireless devices must be mutual - A secure solution enables a mobile worker to gain safe...become points of Mobility and Connectivity. All transmitted packets should be associated with HP Wi-Fi and other aspects of vulnerability that they are vulnerabilities. Before we ...
Wireless Security
Page 3
...HP saw the need to span multiple technologies • Extensibility: solutions must adapt as security needs grow and newer technologies and features become available • Services: implementation support to assist the customer in -one security solution. 3 In addition, many client devices include security features that not only meets mobility and wireless... such as those technologies mature and become available. Businesses trying to the Trusted Computing Group (TCG) standard...add-on a variety of technologies: • Notebook and desktop computers can be added easily by using...
...HP saw the need to span multiple technologies • Extensibility: solutions must adapt as security needs grow and newer technologies and features become available • Services: implementation support to assist the customer in -one security solution. 3 In addition, many client devices include security features that not only meets mobility and wireless... such as those technologies mature and become available. Businesses trying to the Trusted Computing Group (TCG) standard...add-on a variety of technologies: • Notebook and desktop computers can be added easily by using...
Wireless Security
Page 4
...Network Access Controllers that only allow Internet access after the client accepts a Legal Disclaimer. Virtual Private Network Implementations HP solutions: HP Production WLAN HP Wireless Internet Access Vendor Solutions for WEP Vulnerability Although VPN provides adequate security, there may be issues with security,... as the WEP vulnerability issues persisted (for more secure Dynamic WEP key CISCO Hewlett Packard Microsoft HP Wireless Internet Access Solution: Provides full Internet access for on what is available today, as it does not help with roaming...
...Network Access Controllers that only allow Internet access after the client accepts a Legal Disclaimer. Virtual Private Network Implementations HP solutions: HP Production WLAN HP Wireless Internet Access Vendor Solutions for WEP Vulnerability Although VPN provides adequate security, there may be issues with security,... as the WEP vulnerability issues persisted (for more secure Dynamic WEP key CISCO Hewlett Packard Microsoft HP Wireless Internet Access Solution: Provides full Internet access for on what is available today, as it does not help with roaming...
Wireless Security
Page 5
... Integrity Check) The table below lists the advantages and issues of WPA, in comparison to increase the level of security for new wireless LANs, and manage existing solutions with the following features: • Implements 802.1X EAP (Extended Authentication Protocol) based authentication to ...enforce mutual authentication. • Applies Temporal Key Integrity Protocol (TKIP) on 802.11 Wireless LANs are always sent in the clear, this mode of operation does not provide adequate security Limiting propagation is hard, although it...
... Integrity Check) The table below lists the advantages and issues of WPA, in comparison to increase the level of security for new wireless LANs, and manage existing solutions with the following features: • Implements 802.1X EAP (Extended Authentication Protocol) based authentication to ...enforce mutual authentication. • Applies Temporal Key Integrity Protocol (TKIP) on 802.11 Wireless LANs are always sent in the clear, this mode of operation does not provide adequate security Limiting propagation is hard, although it...
Wireless Security
Page 6
... TKIP, AES, and others. WPA Pre-Shared Key While WPA and 802.11i allow EAP Authentication, this solution may not be available on HP notebook PCs. It offers a straightforward replacement to enhance the security features for certificate authentication. The group was approved and ratified June 25, 2004, ...for home use and office or small business use. The IEEE 802.11i standard was asked to produce a detailed specification to WEP keys while offering all wireless devices. IEEE 802.11i To address WEP security issues, IEEE formed a Task Group -...
... TKIP, AES, and others. WPA Pre-Shared Key While WPA and 802.11i allow EAP Authentication, this solution may not be available on HP notebook PCs. It offers a straightforward replacement to enhance the security features for certificate authentication. The group was approved and ratified June 25, 2004, ...for home use and office or small business use. The IEEE 802.11i standard was asked to produce a detailed specification to WEP keys while offering all wireless devices. IEEE 802.11i To address WEP security issues, IEEE formed a Task Group -...
Wireless Security
Page 7
...of 802.11i ) * HP Notebooks with WPA2 Certification are available Emerging Mobile Applications The rise of using this complicated problem since 1980, and can provide more robust security to mail, database and web servers. For more details please visit http://www.hp.com/products/security Key fingerprint...Issues • An extra hardware upgrade is required, in order to data from heterogeneous networks. One aspect of the Internet and wireless connectivity increased the demand for this is based on Trusted Operating system (TOS). Hewlett Packard has had the optimal solution for security...
...of 802.11i ) * HP Notebooks with WPA2 Certification are available Emerging Mobile Applications The rise of using this complicated problem since 1980, and can provide more robust security to mail, database and web servers. For more details please visit http://www.hp.com/products/security Key fingerprint...Issues • An extra hardware upgrade is required, in order to data from heterogeneous networks. One aspect of the Internet and wireless connectivity increased the demand for this is based on Trusted Operating system (TOS). Hewlett Packard has had the optimal solution for security...
Wireless Security
Page 8
... are using HTTPS. An alternative to VPN that is rapidly gaining acceptance is proving to be tightly integrated and will be the optimal encryption for notebooks accessing wireless and mobile networks. use of reverse proxy to enable synchronization of the needed security - This has a huge impact on mobility in terms of...including: device management, security solutions, PIM Synchronization, file sharing (such as Tunnels) to connect to secure transmitted data. and many software solutions - Even consumer-grade wireless and wired routers have VPN and some Firewall and DMZ capabilities.
... are using HTTPS. An alternative to VPN that is rapidly gaining acceptance is proving to be tightly integrated and will be the optimal encryption for notebooks accessing wireless and mobile networks. use of reverse proxy to enable synchronization of the needed security - This has a huge impact on mobility in terms of...including: device management, security solutions, PIM Synchronization, file sharing (such as Tunnels) to connect to secure transmitted data. and many software solutions - Even consumer-grade wireless and wired routers have VPN and some Firewall and DMZ capabilities.
Wireless Security
Page 9
... connection - and connectivity in Wired Equivalent Privacy. This is a subset of the Access Point. The 802.11i standard was developed for wireless security that we apply the new available solutions. HP officially supports the Cisco-Compatible Extensions program. Reverse Proxy has returned, and almost any web application can be part of the...
... connection - and connectivity in Wired Equivalent Privacy. This is a subset of the Access Point. The 802.11i standard was developed for wireless security that we apply the new available solutions. HP officially supports the Cisco-Compatible Extensions program. Reverse Proxy has returned, and almost any web application can be part of the...
Wireless Security
Page 10
Nothing herein should be liable for HP products and services are set forth in implementing wireless solutions by remembering that standards-based wireless network security plus HP ProtectTools security technology equals a more information http://www.hp.com/products/security © 2005 Hewlett-Packard Development Company, L.P. The information contained herein is subject ... mobile computing environment. The only warranties for technical or editorial errors or omissions contained herein. 5983-0863EN Rev 2, 2/2005 10 HP shall not be construed as constituting an additional warranty.
Nothing herein should be liable for HP products and services are set forth in implementing wireless solutions by remembering that standards-based wireless network security plus HP ProtectTools security technology equals a more information http://www.hp.com/products/security © 2005 Hewlett-Packard Development Company, L.P. The information contained herein is subject ... mobile computing environment. The only warranties for technical or editorial errors or omissions contained herein. 5983-0863EN Rev 2, 2/2005 10 HP shall not be construed as constituting an additional warranty.
Lithium-ion battery technology: Getting the most from Smart Batteries
Page 3
... Battery capacity Battery capacity is available within each working day by its immediate environment, such as the heat generated by the notebook itself and by the average operating temperature of the battery. This estimate covers typical users who completely cycle the battery each ...about one cycle. New batteries are expected to electrochemically store a charge. Gradually, less and less active material is expressed in wired or wireless modes. Battery cycle life Battery cycle life is the total number of discharge-charge cycles (Figure 1) a battery yields before it can...
... Battery capacity Battery capacity is available within each working day by its immediate environment, such as the heat generated by the notebook itself and by the average operating temperature of the battery. This estimate covers typical users who completely cycle the battery each ...about one cycle. New batteries are expected to electrochemically store a charge. Gradually, less and less active material is expressed in wired or wireless modes. Battery cycle life Battery cycle life is the total number of discharge-charge cycles (Figure 1) a battery yields before it can...
Lithium-ion battery technology: Getting the most from Smart Batteries
Page 4
...;F) Stationary user (with docking station) Battery cycled weekly (>35ºC, 95ºF) Low (word processing, Internet, e-mail) >80% 80% Moderate (wireless, spreadsheets, database management) 80% 70% High* (CAD, 3D games, DVDs, high LCD brightness) 60% *High power applications may cause a battery to ...decrease. Warranty period HP provides a 12-month warranty for a stationary user who fully discharges and charges the battery almost every working day (300 cycles per week in...
...;F) Stationary user (with docking station) Battery cycled weekly (>35ºC, 95ºF) Low (word processing, Internet, e-mail) >80% 80% Moderate (wireless, spreadsheets, database management) 80% 70% High* (CAD, 3D games, DVDs, high LCD brightness) 60% *High power applications may cause a battery to ...decrease. Warranty period HP provides a 12-month warranty for a stationary user who fully discharges and charges the battery almost every working day (300 cycles per week in...
WLAN solutions for HP enterprise notebooks and Tablet PCs
Page 3
... of mobile computers with integrated WLAN. The IEEE 802.1x standard and EAP protocols define a framework for enterprise notebooks and Tablet PCs, including WLAN adapters based on a network, as well as Cisco Lightweight Extensible Authentication Protocol (LEAP) and... performance, and manageability. Adoption of WLAN by enterprise businesses, initially held back by concerns over security and manageability, is protected by HP and our WLAN technology partners. Executive summary HP has a comprehensive offering of mobile wireless local area network (WLAN) solutions that is widely ...
... of mobile computers with integrated WLAN. The IEEE 802.1x standard and EAP protocols define a framework for enterprise notebooks and Tablet PCs, including WLAN adapters based on a network, as well as Cisco Lightweight Extensible Authentication Protocol (LEAP) and... performance, and manageability. Adoption of WLAN by enterprise businesses, initially held back by concerns over security and manageability, is protected by HP and our WLAN technology partners. Executive summary HP has a comprehensive offering of mobile wireless local area network (WLAN) solutions that is widely ...
WLAN solutions for HP enterprise notebooks and Tablet PCs
Page 4
...network. WLAN driver and client software that are compatible across multiple notebooks and WLAN adapters, and are backwards compatible with previous revisions, ... transitions. WPA is validated by its adoption by the HP ProtectTools Security Manager-a single client console application that builds on...block lengths and key lengths are variable. (Block ciphers are addressing business customer needs for better protection against unauthorized PC access, as well as... solutions-such as 802.1x and the ability to make wireless networks as secure as wired LANs. Collectively, these features are...
...network. WLAN driver and client software that are compatible across multiple notebooks and WLAN adapters, and are backwards compatible with previous revisions, ... transitions. WPA is validated by its adoption by the HP ProtectTools Security Manager-a single client console application that builds on...block lengths and key lengths are variable. (Block ciphers are addressing business customer needs for better protection against unauthorized PC access, as well as... solutions-such as 802.1x and the ability to make wireless networks as secure as wired LANs. Collectively, these features are...
WLAN solutions for HP enterprise notebooks and Tablet PCs
Page 5
... over longer distances and helps maximize throughput at each WLAN notebook meets HP's exacting standards. Performance HP works to optimize WLAN performance at all HP business notebook WLANs are "dual-band"-capable of supporting wireless LAN technologies that work independently-to help ensure the best ...possible performance, regardless of how the notebook is committed to benefit from the higher network ...
... over longer distances and helps maximize throughput at each WLAN notebook meets HP's exacting standards. Performance HP works to optimize WLAN performance at all HP business notebook WLANs are "dual-band"-capable of supporting wireless LAN technologies that work independently-to help ensure the best ...possible performance, regardless of how the notebook is committed to benefit from the higher network ...
WLAN solutions for HP enterprise notebooks and Tablet PCs
Page 7
...,192 m Table 2: WLAN adapter availability by product HP Notebook Intel PRO/ Wireless 2100 HP Compaq Business Notebook nc4000 No HP Compaq Business Notebook nc4010 Yes HP Compaq Business Notebook nc6000 Yes HP Compaq Business Notebook nc8000 Yes HP Compaq Mobile Workstation nw8000 Yes HP Compaq Tablet PC TC1100 Yes Intel PRO/ Wireless 2200BG No Yes Yes Yes Yes Yes HP WLAN W400 Yes Yes Yes Yes Yes No HP WLAN W500 Yes Yes Yes Yes Yes Yes...
...,192 m Table 2: WLAN adapter availability by product HP Notebook Intel PRO/ Wireless 2100 HP Compaq Business Notebook nc4000 No HP Compaq Business Notebook nc4010 Yes HP Compaq Business Notebook nc6000 Yes HP Compaq Business Notebook nc8000 Yes HP Compaq Mobile Workstation nw8000 Yes HP Compaq Tablet PC TC1100 Yes Intel PRO/ Wireless 2200BG No Yes Yes Yes Yes Yes HP WLAN W400 Yes Yes Yes Yes Yes No HP WLAN W500 Yes Yes Yes Yes Yes Yes...
WLAN solutions for HP enterprise notebooks and Tablet PCs
Page 8
...the IEEE June, 2004. WPA2 interoperability testing expected to start in the second half of the client software supported by the previously listed HP Compaq ncand tc-series products. Control (as on Web) WLAN HW Support 2.00E 3.00A N/A 12 Mar 04 20 April 04 W400,...252; ü ü ü ü ü ü ü ü ü ü ü ü ü ü 6 802.11i ratifed by nc- Pro/Wireless wireless network adapters, the manufacturer's software is the Intel ProSet Network Configuration Utility. Atheros (Atheros Client Utility) 2.4 3.1 Microsoft Windows XP...
...the IEEE June, 2004. WPA2 interoperability testing expected to start in the second half of the client software supported by the previously listed HP Compaq ncand tc-series products. Control (as on Web) WLAN HW Support 2.00E 3.00A N/A 12 Mar 04 20 April 04 W400,...252; ü ü ü ü ü ü ü ü ü ü ü ü ü ü 6 802.11i ratifed by nc- Pro/Wireless wireless network adapters, the manufacturer's software is the Intel ProSet Network Configuration Utility. Atheros (Atheros Client Utility) 2.4 3.1 Microsoft Windows XP...
WLAN solutions for HP enterprise notebooks and Tablet PCs
Page 10
...; Intel ProSet Network Configuration Utility Recommended WLAN adapters • HP WLAN W400, W500 • Intel Pro/Wireless 2100, 2200BG • HP WLAN W400, W500 • Intel Pro/Wireless 2100, 2200BG • Intel Pro/Wireless 2100, 2200BG • HP WLAN W500 • • HP WLAN W400, W500 • Intel Pro/Wireless 2100, 2200BG 10 To assist in this selection...
...; Intel ProSet Network Configuration Utility Recommended WLAN adapters • HP WLAN W400, W500 • Intel Pro/Wireless 2100, 2200BG • HP WLAN W400, W500 • Intel Pro/Wireless 2100, 2200BG • Intel Pro/Wireless 2100, 2200BG • HP WLAN W500 • • HP WLAN W400, W500 • Intel Pro/Wireless 2100, 2200BG 10 To assist in this selection...
HP Compaq Business Notebook nc4010 software overview
Page 2
...HP Compaq Business Notebook nc4010 preinstall image include: • Support for TCG compliant TPM security module - HP Compaq Business Notebook nc4010 - HP Compaq Business Notebook nc4000 • Certifications: - Highlights Benefits of 2004. Optional Integrated Smart Card Reader (replaces PC card slot) - Optional integrated 802.11b (Intel©), 802.11b/g and 802.11a/b/g wireless... - HP also supports customers who need information about the software provided on their own. 2 Abstract The purpose of this white paper is to HP Compaq Business Notebook nc4000, nc6000 and nc8000 models....
...HP Compaq Business Notebook nc4010 preinstall image include: • Support for TCG compliant TPM security module - HP Compaq Business Notebook nc4010 - HP Compaq Business Notebook nc4000 • Certifications: - Highlights Benefits of 2004. Optional Integrated Smart Card Reader (replaces PC card slot) - Optional integrated 802.11b (Intel©), 802.11b/g and 802.11a/b/g wireless... - HP also supports customers who need information about the software provided on their own. 2 Abstract The purpose of this white paper is to HP Compaq Business Notebook nc4000, nc6000 and nc8000 models....
HP Compaq Business Notebook nc4010 software overview
Page 4
...Notebooks HP WLAN W400/W500 Driver Infineon TPM Driver Insight Management Agents (Win32) Intel Chipset Driver Intel SpeedStep Application Intel PRO/Wireless 2100 3B Mini PCI Adapter Microsoft DirectX O2 Micro Memory CardBus Accelerator O2 Micro Memory CardBus Reader Roxio Easy CD Creator Sun Java Synaptics Touchpad System Enhancements HP Compaq...(CD) 1.4.2 7.00 C 6.00 E HP Compaq nc6000 4.11 A (preloaded) 1.00 A (preloaded) 2.10 B 2.00 A 1.00 A 5.00 K (preloaded) 5.00 A 3.00 B (preloaded) 2.00 A 9.00 A 1.00 B 2.00 B 6.11 A (CD) 1.4.2 7.5 D 6.00 E HP Compaq nc8000 4.11 A (preloaded) 1.00 A (...
...Notebooks HP WLAN W400/W500 Driver Infineon TPM Driver Insight Management Agents (Win32) Intel Chipset Driver Intel SpeedStep Application Intel PRO/Wireless 2100 3B Mini PCI Adapter Microsoft DirectX O2 Micro Memory CardBus Accelerator O2 Micro Memory CardBus Reader Roxio Easy CD Creator Sun Java Synaptics Touchpad System Enhancements HP Compaq...(CD) 1.4.2 7.00 C 6.00 E HP Compaq nc6000 4.11 A (preloaded) 1.00 A (preloaded) 2.10 B 2.00 A 1.00 A 5.00 K (preloaded) 5.00 A 3.00 B (preloaded) 2.00 A 9.00 A 1.00 B 2.00 B 6.11 A (CD) 1.4.2 7.5 D 6.00 E HP Compaq nc8000 4.11 A (preloaded) 1.00 A (...