Contents ix
202-10099-01, April 2005
Are Login Protocols U sed? ...................................................................................C-20
What Is Your Configuration Information? ..............................................................C-20
Obtaining ISP Configuration Information for W indows C om puters .......................C-21
Obtaining ISP Configuration Information for M acintosh C om puters .....................C-22
Restarting the Network ................................................................................................C-23
Appendix D
Wireless Networking Basics
Wireless Networking Overview ......................................................................................D -1
Infrastructure Mode .................................................................................................D -1
Ad Hoc M ode (Peer-to-Peer Workgroup) ................................................................D -2
Network Name: Extended Service Set Identification (ESSID ) ................................D -2
Authentication and WEP D ata Encryption .....................................................................D -2
802.11 Authentication ..............................................................................................D -3
Open System Authentication ...................................................................................D -3
Shared Key Authentication ......................................................................................D -4
Overview of WEP Parameters ................................................................................D -5
Key Size ..................................................................................................................D -6
WEP Configuration Options ....................................................................................D -7
Wireless Channels .........................................................................................................D -7
WPA and W PA2 Wireless Security ................................................................................D -8
How D oes WPA Compare to WEP? ........................................................................D -9
How Does WPA Compare to WPA2 (IEEE 802.11i)? ............................................D -10
What are the Key Features of WPA and WPA2 Security? ....................................D -10
WPA/WPA2 Authentication: Enterprise-level User
Authentication via 802.1x/EAP and R AD IU S ..................................................D -12
WPA/W PA2 D ata Encryption Key M anagement .............................................D -14
Is WPA/WPA2 Perfect? .........................................................................................D -16
Product Support for WPA/WPA2 ...........................................................................D -16
Supporting a Mixture of WPA, WPA2, and WEP Wireless Clients is Discouraged D-16
Changes to Wireless Access Points ...............................................................D -17
Changes to Wireless Network Adapters .........................................................D -17
Changes to Wireless Client Programs ............................................................D -18
Glossary