NETGEAR WG111U user manual Wireless Networking Basics

Page 73

User’s Manual for the NETGEAR Super AG Wireless USB 2.0 Adapter WG111U

The primary information conveyed in the Beacon frames is the authentication method and the cipher suite. Possible authentication methods include 802.1X and Pre-shared key. Pre-shared key is an authentication method that uses a statically configured passphrase on both the stations and the access point. This removes the need for an authentication server, which in many home and small office environments will not be available nor desirable. Possible cipher suites include: WEP, TKIP, and AES (Advanced Encryption Standard). We’ll talk more TKIP and AES when addressing data privacy below.

Authentication. EAP over 802.1X is used for authentication. Mutual authentication is gained by choosing an EAP type supporting this feature and is required by WPA. The 802.1X port access control prevents full access to the network until authentication completes. The 802.1X EAPOL-Key packets are used by WPA to distribute per-session keys to those stations successfully authenticated.

The supplicant in the station uses the authentication and cipher suite information contained in the information elements to decide which authentication method and cipher suite to use. For example, if the access point is using the Pre-shared key method then the supplicant need not authenticate using full-blown 802.1X. Rather, the supplicant must simply prove to the access point that it is in possession of the pre-shared key. If the supplicant detects that the service set does not contain a WPA information element then it knows it must use pre-WPA 802.1X authentication and key management in order to access the network.

Key management. WPA features a robust key generation/management system that integrates the authentication and data privacy functions. Keys are generated after successful authentication and through a subsequent four-way handshake between the station and access point (AP).

Data Privacy (Encryption). Temporal Key Integrity Protocol (TKIP) is used to wrap WEP in sophisticated cryptographic and security techniques to overcome most of its weaknesses.

Data integrity. TKIP includes a message integrity code (MIC) at the end of each plain text message to ensure messages are not being spoofed.

Wireless Networking Basics

B-11

202-10065-01

Image 73
Contents 202-10065-01 Certificate of the Manufacturer/Importer Technical SupportDeclaration Of Conformity FCC Guidelines for Human ExposureFCC Requirements for Operation in the United States Export Restrictions Operation Using 2.4 GHz Channels in FranceMetropolitan Regions with Eased Restrictions in 2.4GHz Band Allowed 5GHz Channels in Each European Community Country Operation Using 5 GHz Channels in the European CommunityVii Viii Contents Chapter Configuration Appendix C Preparing Your Network to Work with a Router Glossary Index Chapter About This Manual Manual SpecificationsAudience, Scope, Conventions Typographical conventionsHtml version of this manual How to Use this ManualHow to Print this Manual About This Manual About the WG111U Chapter Introduction802.11a and 802.11b/g Wireless Networking Key FeaturesComparing the 802.11a, 802.11b, and 802.11g Modes Comparison of Wireless ModesWhat’s in the Box? Road Map for ‘How to Get There From Here’If I Want To? What’s Needed? What Do I Do? How Do I? Road Map for How to Get There From HereNetgear Super AG Netgear Super AG Wireless Wired network Wirelessly connect What You Need Before You Begin Chapter Basic SetupVerifying System Requirements Observing Location and Range Guidelines Determining Placement of the USB AdapterAttach fastener to back of plastic cradle Two Basic Operating ModesBasic Installation Instructions WG111U Default Wireless Configuration SettingsFor Windows XP Users Installing a WG111U Install the Netgear Super AG Wireless USB 2.0 Adapter WG111U Configure your WG111U Verify wireless connectivity to your network For Windows 2000, ME, and 98SE Users Installing a WG111U Found New Hardware Wizard WG111U System Tray Icon Configure your WG111U WG111U Wireless Connection Indicators Status LED Interpreting the LED on the WG111ULED Descriptions Color Condition Description Interpreting System Tray Icon ColorsRed YellowUnderstanding the Configuration Options Chapter ConfigurationUsing Configuration Profiles How to Configure an Infrastructure Mode Profile Connecting to an Access Point in Infrastructure ModeRun the WG111U Smart Wireless Wizard Save your settings in a Profile Configure the wireless network settingsHow to Configure an Ad-hoc Mode Profile Connecting to Another PC in Ad-hoc ModeConfigure the PC network settings Ad-Hoc Setting dialog box Ping -t 192.168.0.1 and then click OK Statistics What’s on the Statistics Page?Advanced Settings Understanding the Advanced SettingsTPC Configuration Procedure European Regulatory Requirements for Transmit Power ControlConfiguration Understanding the Security Options Chapter Wireless Security ConfigurationBasic Requirements for WEP Using WEP SecurityWireless Network Name Ssid WEP Security Settings WorksheetWEP Security Encryption Key Configure the Network Name Ssid settings How to Configure WEP Encryption SecurityConfigure the WEP settings Basic Requirements for WPA-PSK Using WPA-PSK Advanced SecurityHow to Configure WPA-PSK Advanced Security WPA-PSK Security Settings WorksheetWPA-PSK settings screen Configure the WPA-PSK settingsWireless Security Configuration Basic Tips Chapter TroubleshootingAd Hoc mode is not working correctly Frequently Asked QuestionsGeneral Questions New Hardware Wizard appears after installation has completed How to use XP’s own Wireless configuration utilityTroubleshooting USB Appendix a Technical SpecificationsTechnical Specifications Wireless Networking Overview Appendix B Wireless Networking BasicsInfrastructure Mode Network Name Extended Service Set Identification Essid Ad Hoc Mode Peer-to-Peer WorkgroupWireless Channels Table B-1 802.11g Radio Frequency Channels Radio frequency channels used are listed in Table B-1WEP Authentication WEP Wireless SecurityAccess point have the same WEP are described below Authentication Shared Key Steps Key Size and Configuration How to Use WEP Parameters WPA Wireless SecurityHow Does WPA Compare to WEP? How Does WPA Compare to Ieee 802.11i? What are the Key Features of WPA Security?Wireless Networking Basics Figure B-3 WPA Overview Login AuthenticationFigure B-4 802.1x Authentication Sequence WPA Data Encryption Key Management Temporal Key Integrity Protocol Tkip Changes to Wireless Access Points Supporting a Mixture of WPA and WEP Wireless ClientsIs WPA Perfect? Product Support for WPAChanges to Wireless Network Adapters WPA two-phase authenticationNew WPA information element MichaelChanges to Wireless Client Programs Appendix C Preparing Your Network to Work with a Router Computer Network Configuration RequirementsWhat You Need To Use a Router with a Broadband Modem Cabling and Computer HardwareWhere Do I Get the Internet Configuration Parameters? Internet Configuration RequirementsRecord Your Internet Connection Information Preparing Your Computers for TCP/IP Networking Installing or Verifying Windows Networking Components Configuring Windows 95, 98, and Me for TCP/IP NetworkingInstalling a New Adapter Installing the Client for Microsoft Networks Installing TCP/IPOpen the Network Panel Verify the Configuration SettingsVerify the Properties IP Address Setting Selecting the Windows’ Internet Access MethodVerifying TCP/IP Properties Configuring Windows NT4, 2000 or XP for IP Networking Dhcp Configuration of TCP/IP in Windows XP Configuring Dhcp of TCP/IP in Windows XP, 2000, or NT4Open the Network Connection Window Go to the Network Connection Status windowSet Dhcp for TCP/IP Go to PropertiesCheck the Local Area Connection Properties Settings Dhcp Configuration of TCP/IP in WindowsCheck the Internet Protocol Properties Complete the configurationGo to TCP/IP Properties Dhcp Configuration of TCP/IP in Windows NT4Set the TCP/IP Properties Verifying TCP/IP Properties for Windows XP, 2000, and NT4MacOS 8.6 or Configuring the Macintosh for TCP/IP NetworkingMacOS Verifying TCP/IP Properties for Macintosh Computers Verifying the Readiness of Your Internet AccountWhat Is Your Configuration Information? Are Login Protocols Used?Select the Gateway tab Restarting the Network Glossary Glossary-2 Glossary Glossary-3 Glossary-4 Glossary Glossary-5 Glossary-6 Numerics IndexIndex-2