EasyManua.ls Logo

NETGEAR WGR614 v6 - Page 9

NETGEAR WGR614 v6
154 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Contents ix
202-10099-01, April 2005
Are Login Protocols U sed? ...................................................................................C-20
What Is Your Configuration Information? ..............................................................C-20
Obtaining ISP Configuration Information for W indows C om puters .......................C-21
Obtaining ISP Configuration Information for M acintosh C om puters .....................C-22
Restarting the Network ................................................................................................C-23
Appendix D
Wireless Networking Basics
Wireless Networking Overview ......................................................................................D -1
Infrastructure Mode .................................................................................................D -1
Ad Hoc M ode (Peer-to-Peer Workgroup) ................................................................D -2
Network Name: Extended Service Set Identification (ESSID ) ................................D -2
Authentication and WEP D ata Encryption .....................................................................D -2
802.11 Authentication ..............................................................................................D -3
Open System Authentication ...................................................................................D -3
Shared Key Authentication ......................................................................................D -4
Overview of WEP Parameters ................................................................................D -5
Key Size ..................................................................................................................D -6
WEP Configuration Options ....................................................................................D -7
Wireless Channels .........................................................................................................D -7
WPA and W PA2 Wireless Security ................................................................................D -8
How D oes WPA Compare to WEP? ........................................................................D -9
How Does WPA Compare to WPA2 (IEEE 802.11i)? ............................................D -10
What are the Key Features of WPA and WPA2 Security? ....................................D -10
WPA/WPA2 Authentication: Enterprise-level User
Authentication via 802.1x/EAP and R AD IU S ..................................................D -12
WPA/W PA2 D ata Encryption Key M anagement .............................................D -14
Is WPA/WPA2 Perfect? .........................................................................................D -16
Product Support for WPA/WPA2 ...........................................................................D -16
Supporting a Mixture of WPA, WPA2, and WEP Wireless Clients is Discouraged D-16
Changes to Wireless Access Points ...............................................................D -17
Changes to Wireless Network Adapters .........................................................D -17
Changes to Wireless Client Programs ............................................................D -18
Glossary

Table of Contents

Related product manuals