NETGEAR WG111U user manual WEP Wireless Security, WEP Authentication

Page 66

User’s Manual for the NETGEAR Super AG Wireless USB 2.0 Adapter WG111U

WEP Wireless Security

The absence of a physical connection between nodes makes the wireless links vulnerable to eavesdropping and information theft. To provide a certain level of security, the IEEE 802.11 standard has defined two types of authentication methods, Open System and Shared Key. With Open System authentication, a wireless computer can join any network and receive any messages that are not encrypted. With Shared Key authentication, only those computers that possess the correct authentication key can join the network. By default, IEEE 802.11 wireless devices operate in an Open System network. Recently, Wi-Fi, the Wireless Ethernet Compatibility Alliance (http://www.wi-fi.net) developed the Wi-Fi Protected Access (WPA), a new strongly enhanced Wi-Fi security. WPA will soon be incorporated into the IEEE 802.11 standard. WEP and WPA are discussed below.

WEP Authentication

The 802.11 standard defines several services that govern how two 802.11 devices communicate. The following events must occur before an 802.11 Station can communicate with an Ethernet network through an access point such as the one built in to the WG111U:

1.Turn on the wireless station.

2.The station listens for messages from any access points that are in range.

3.The station finds a message from an access point that has a matching SSID.

4.The station sends an authentication request to the access point.

5.The access point authenticates the station.

6.The station sends an association request to the access point.

7.The access point associates with the station.

8.The station can now communicate with the Ethernet network through the access point.

An access point must authenticate a station before the station can associate with the access point or communicate with the network. The IEEE 802.11 standard defines two types of WEP authentication: Open System and Shared Key.

Open System Authentication allows any device to join the network, assuming that the device SSID matches the access point SSID. Alternatively, the device can use the “ANY” SSID option to associate with any available access point within range, regardless of its SSID.

B-4

Wireless Networking Basics

202-10065-01

Image 66
Contents 202-10065-01 Technical Support Certificate of the Manufacturer/ImporterFCC Guidelines for Human Exposure Declaration Of ConformityFCC Requirements for Operation in the United States Operation Using 2.4 GHz Channels in France Export RestrictionsMetropolitan Regions with Eased Restrictions in 2.4GHz Band Operation Using 5 GHz Channels in the European Community Allowed 5GHz Channels in Each European Community CountryVii Viii Contents Chapter Configuration Appendix C Preparing Your Network to Work with a Router Glossary Index Audience, Scope, Conventions Manual SpecificationsChapter About This Manual Typographical conventionsHow to Use this Manual Html version of this manualHow to Print this Manual About This Manual Chapter Introduction About the WG111UKey Features 802.11a and 802.11b/g Wireless NetworkingComparison of Wireless Modes Comparing the 802.11a, 802.11b, and 802.11g ModesRoad Map for ‘How to Get There From Here’ What’s in the Box?Road Map for How to Get There From Here If I Want To? What’s Needed? What Do I Do? How Do I?Netgear Super AG Netgear Super AG Wireless Wired network Wirelessly connect Chapter Basic Setup What You Need Before You BeginVerifying System Requirements Determining Placement of the USB Adapter Observing Location and Range GuidelinesTwo Basic Operating Modes Attach fastener to back of plastic cradleWG111U Default Wireless Configuration Settings Basic Installation InstructionsFor Windows XP Users Installing a WG111U Install the Netgear Super AG Wireless USB 2.0 Adapter WG111U Configure your WG111U Verify wireless connectivity to your network For Windows 2000, ME, and 98SE Users Installing a WG111U Found New Hardware Wizard WG111U System Tray Icon Configure your WG111U WG111U Wireless Connection Indicators Interpreting the LED on the WG111U Status LEDLED Descriptions Red Interpreting System Tray Icon ColorsColor Condition Description YellowChapter Configuration Understanding the Configuration OptionsUsing Configuration Profiles Connecting to an Access Point in Infrastructure Mode How to Configure an Infrastructure Mode ProfileRun the WG111U Smart Wireless Wizard Configure the wireless network settings Save your settings in a ProfileConnecting to Another PC in Ad-hoc Mode How to Configure an Ad-hoc Mode ProfileConfigure the PC network settings Ad-Hoc Setting dialog box Ping -t 192.168.0.1 and then click OK What’s on the Statistics Page? StatisticsUnderstanding the Advanced Settings Advanced SettingsEuropean Regulatory Requirements for Transmit Power Control TPC Configuration ProcedureConfiguration Chapter Wireless Security Configuration Understanding the Security OptionsUsing WEP Security Basic Requirements for WEPWEP Security Settings Worksheet Wireless Network Name SsidWEP Security Encryption Key How to Configure WEP Encryption Security Configure the Network Name Ssid settingsConfigure the WEP settings Using WPA-PSK Advanced Security Basic Requirements for WPA-PSKWPA-PSK Security Settings Worksheet How to Configure WPA-PSK Advanced SecurityConfigure the WPA-PSK settings WPA-PSK settings screenWireless Security Configuration Chapter Troubleshooting Basic TipsFrequently Asked Questions Ad Hoc mode is not working correctlyGeneral Questions How to use XP’s own Wireless configuration utility New Hardware Wizard appears after installation has completedTroubleshooting Appendix a Technical Specifications USBTechnical Specifications Appendix B Wireless Networking Basics Wireless Networking OverviewInfrastructure Mode Ad Hoc Mode Peer-to-Peer Workgroup Network Name Extended Service Set Identification EssidWireless Channels Radio frequency channels used are listed in Table B-1 Table B-1 802.11g Radio Frequency ChannelsWEP Wireless Security WEP AuthenticationAccess point have the same WEP are described below Authentication Shared Key Steps Key Size and Configuration WPA Wireless Security How to Use WEP ParametersHow Does WPA Compare to WEP? What are the Key Features of WPA Security? How Does WPA Compare to Ieee 802.11i?Wireless Networking Basics Login Authentication Figure B-3 WPA OverviewFigure B-4 802.1x Authentication Sequence WPA Data Encryption Key Management Temporal Key Integrity Protocol Tkip Is WPA Perfect? Supporting a Mixture of WPA and WEP Wireless ClientsChanges to Wireless Access Points Product Support for WPANew WPA information element WPA two-phase authenticationChanges to Wireless Network Adapters MichaelChanges to Wireless Client Programs What You Need To Use a Router with a Broadband Modem Computer Network Configuration RequirementsAppendix C Preparing Your Network to Work with a Router Cabling and Computer HardwareInternet Configuration Requirements Where Do I Get the Internet Configuration Parameters?Record Your Internet Connection Information Preparing Your Computers for TCP/IP Networking Configuring Windows 95, 98, and Me for TCP/IP Networking Installing or Verifying Windows Networking ComponentsInstalling a New Adapter Installing TCP/IP Installing the Client for Microsoft NetworksVerify the Configuration Settings Open the Network PanelSelecting the Windows’ Internet Access Method Verify the Properties IP Address SettingVerifying TCP/IP Properties Configuring Windows NT4, 2000 or XP for IP Networking Open the Network Connection Window Configuring Dhcp of TCP/IP in Windows XP, 2000, or NT4Dhcp Configuration of TCP/IP in Windows XP Go to the Network Connection Status windowGo to Properties Set Dhcp for TCP/IPDhcp Configuration of TCP/IP in Windows Check the Local Area Connection Properties SettingsComplete the configuration Check the Internet Protocol PropertiesDhcp Configuration of TCP/IP in Windows NT4 Go to TCP/IP PropertiesVerifying TCP/IP Properties for Windows XP, 2000, and NT4 Set the TCP/IP PropertiesConfiguring the Macintosh for TCP/IP Networking MacOS 8.6 orMacOS Verifying the Readiness of Your Internet Account Verifying TCP/IP Properties for Macintosh ComputersAre Login Protocols Used? What Is Your Configuration Information?Select the Gateway tab Restarting the Network Glossary Glossary-2 Glossary Glossary-3 Glossary-4 Glossary Glossary-5 Glossary-6 Index NumericsIndex-2