NETGEAR WPN802 User Manual

Page 7

Advertising
background image

Contents

vii

202-10101-01, 4 May 2005

Appendix A

Technical Specifications

Appendix B

Wireless Networking Basics

Wireless Networking Overview ...................................................................................... B-1

Infrastructure Mode ................................................................................................. B-1

Ad Hoc Mode (Peer-to-Peer Workgroup) ................................................................ B-2

Network Name: Extended Service Set Identification (ESSID) ................................ B-2

Authentication and WEP Data Encryption ..................................................................... B-2

802.11 Authentication .............................................................................................. B-3

Open System Authentication ................................................................................... B-3

Shared Key Authentication ...................................................................................... B-4

Overview of WEP Parameters ................................................................................ B-5

Key Size .................................................................................................................. B-6

WEP Configuration Options .................................................................................... B-7

Wireless Channels ......................................................................................................... B-7

WPA and WPA2 Wireless Security ................................................................................ B-8

How Does WPA Compare to WEP? ........................................................................ B-9

How Does WPA Compare to WPA2 (IEEE 802.11i)? ............................................ B-10

What are the Key Features of WPA and WPA2 Security? .................................... B-10

WPA/WPA2 Authentication: Enterprise-level User

Authentication via 802.1x/EAP and RADIUS .................................................. B-12

WPA/WPA2 Data Encryption Key Management ............................................. B-14

Is WPA/WPA2 Perfect? ......................................................................................... B-16

Product Support for WPA/WPA2 ........................................................................... B-16

Supporting a Mixture of WPA, WPA2, and WEP

Wireless Clients is Discouraged ..................................................................... B-16

Changes to Wireless Access Points ............................................................... B-17

Changes to Wireless Network Adapters ......................................................... B-17

Changes to Wireless Client Programs ............................................................ B-18

Glossary

Advertising