NETGEAR MA111 User Manual

Page 8

Advertising
background image

202-10032-01

viii

Contents

How to Start a Computer-to-Computer (Ad-Hoc) Network .......................................4-5

Enabling Wireless Security Features ..............................................................................4-5

Identifying the Wireless Network Name (SSID) and WEP Security Settings ...........4-6

How to Configure WEP Encryption Security ............................................................4-7

How to Configure WPA Encryption Security ............................................................4-8

Statistics Page ........................................................................................................4-10

Advanced Settings Page ........................................................................................4-10

Appendix A

Technical Specifications

Appendix B

Wireless Networking Basics

Wireless Networking Overview ...................................................................................... B-1

Infrastructure Mode ................................................................................................. B-1

Ad-Hoc Mode (Peer-to-Peer Workgroup) ................................................................ B-2

Network Name: Extended Service Set Identification (ESSID) ................................ B-2

Wireless Channels ......................................................................................................... B-2

Authentication and WEP ................................................................................................ B-4

802.11 Authentication .............................................................................................. B-4

Open System Authentication ................................................................................... B-5

Shared Key Authentication ...................................................................................... B-5

Overview of WEP Parameters ................................................................................ B-6

Key Size .................................................................................................................. B-7

WEP Configuration Options .................................................................................... B-8

WPA Wireless Security .................................................................................................. B-8

How Does WPA Compare to WEP? ........................................................................ B-9

How Does WPA Compare to IEEE 802.11i? ........................................................ B-10

What are the Key Features of WPA Security? ...................................................... B-10

WPA Authentication: Enterprise-level User

Authentication via 802.1x/EAP and RADIUS .................................................. B-12

WPA Data Encryption Key Management ........................................................ B-14

Is WPA Perfect? .................................................................................................... B-16

Product Support for WPA ...................................................................................... B-16

Supporting a Mixture of WPA and WEP Wireless Clients ............................... B-16

Changes to Wireless Access Points ............................................................... B-16

Changes to Wireless Network Adapters ......................................................... B-17

Changes to Wireless Client Programs ............................................................ B-18

Advertising