NETGEAR WG511U user manual WEP Keys, Bit WEP

Page 61

User’s Manual for the NETGEAR Double 108 Mbps Wireless PC Card 32-bit CardBus WG511U

2.The access point sends challenge text to the station.

3.The station uses its configured 64-bit or 128-bit default key to encrypt the challenge text, and sends the encrypted text to the access point.

4.The access point decrypts the encrypted text using its configured WEP Key that corresponds to the station’s default key. The access point compares the decrypted text with the original challenge text. If the decrypted text matches the original challenge text, then the access point and the station share the same WEP Key and the access point authenticates the station.

5.The station connects to the network.

If the decrypted text does not match the original challenge text (i.e., the access point and station do not share the same WEP Key), then the access point will refuse to authenticate the station and the station will be unable to communicate with either the 802.11 network or Ethernet network.

WEP Keys

The IEEE 802.11 standard supports two types of WEP encryption: 64-bit and 128-bit. 128-bit encryption is stronger than 64-bit encryption, but 128-bit encryption may not be available outside of the United States due to U.S. export regulations.

64-bit WEP

The 64-bit WEP data encryption method, allows for a five-character (40-bit) input. Additionally, 24 factory-set bits are added to the forty-bit input to generate a 64-bit encryption key. (The 24 factory-set bits are not user-configurable). This encryption key will be used to encrypt/decrypt all data transmitted via the wireless interface. Some vendors refer to the 64-bit WEP data encryption as 40-bit WEP data encryption since the user-configurable portion of the encryption key is 40 bits wide.

When configured for 64-bit encryption, 802.11 products typically support up to four WEP Keys. Each 64-bit WEP Key is expressed as 5 sets of two hexadecimal digits (0-9 and A-F). For example, “12 34 56 78 90” is a 40-bit WEP Key.

128-bit WEP

The 128-bit WEP data encryption method consists of 104 user-configurable bits. Similar to the forty-bit WEP data encryption method, the remaining 24 bits are factory set and not user configurable. Some vendors allow passphrases to be entered instead of the cryptic hexadecimal characters to ease encryption key entry.

Wireless Networking Basics

B-9

August 2004

Image 61
Contents August Technical Support FCC Information to User Export Restrictions Contents Chapter Wireless Security Configuration Glossary Contents Audience, Conventions, Publication Date Chapter About This ManualHtml version of this manual How to Navigate this ManualHow to Print this Manual About This Manual Chapter Introduction Key Features and Related Netgear ProductsWhat’s in the Box? 802.11a and 802.11b/g Wireless NetworkingRoad Map for How to Get There From Here Road Map for ‘How to Get There From Here’Netgear Double Exchange files Use printers What You Need Before You Begin Chapter Basic SetupVerifying System Requirements Observing Location and Range Guidelines Two Basic Operating ModesWG511U Default Wireless Configuration Settings For Windows XP Users Installing a WG511U Basic Installation InstructionsClick Install Driver and Utility Basic Setup Wireless Security Configuration Configure your WG511ULED Descriptions Verify wireless connectivity to your networkFor Windows 2000 & 98/Me Users Installing a WG511U Found New Hardware Wizard Profile Configure your WG511U and saveBelow Word Meaning Interpreting the LED on the WG511U WG511U Wireless Connection IndicatorsColor Condition Description Interpreting System Tray Icon ColorsBasic Tips TroubleshootingTroubleshooting Frequently Asked Questions Basic Setup Understanding the Configuration Options Chapter Netgear Smart Wireless WizardUsing Configuration Profiles Connecting to an Access Point in Infrastructure Mode Run the WG511U Smart Wireless Wizard How to Configure an Infrastructure Mode ProfileConfigure the wireless network settings Save your settings in a ProfileNetgear WG511U Wireless PC Card in Computer-to-Computer Mode Connecting to Another PC in Ad-hoc ModeConfigure the PC network settings How to Configure an Ad-hoc Mode NetworkAd-Hoc Setting What’s on the Statistics Page? Understanding the Advanced Settings Understanding the Security Options Chapter Wireless Security ConfigurationBasic Requirements for WEP Using WEP SecurityWireless Network Name Ssid WEP Security Settings WorksheetWEP Security Encryption Key Configure the Network Name Ssid settings How to Configure WEP Encryption SecurityConfigure the WEP settings Basic Requirements for WPA-PSK Using WPA-PSK Advanced SecurityHow to Configure WPA-PSK Advanced Security WPA-PSK Security Settings WorksheetWPA-PSK settings screen Configure the WPA-PSK settingsWireless Security Configuration FCC, CE Appendix a Technical SpecificationsTechnical Specifications Wireless Networking Overview Appendix B Wireless Networking BasicsInfrastructure Mode Network Name Extended Service Set Identification Essid Ad Hoc Mode Peer-to-Peer WorkgroupWireless Channels 802.11b/g Wireless Channels 802.11a Legal Power Output and Wireless Channels WG511U user can use thirteen channels in non-turbomode WPA Wireless Security OverviewWEP Overview WEP Authentication802.1x Cisco LeapAuthentication Open System Steps Bit WEP WEP KeysWEP Key Configuration How to Use WEP Parameters802.1x Port Based Network Access Control Figure B-4 802.1x authentication WPA Wireless Security How Does WPA Compare to WEP? How Does WPA Compare to Ieee 802.11i? What are the Key Features of WPA Security?Figure B-5 WPA Overview Figure B-6 WPA/802.1x Authentication Sequence Wireless Networking Basics Temporal Key Integrity Protocol Tkip WPA Data Encryption Key ManagementMichael Product Support for WPA Is WPA Perfect?AES Support Wireless network adapters Wireless client programs Wireless Networking Basics Configuring Windows 98 and Me for TCP/IP Networking Appendix C Preparing Your PCs for Network AccessInstall or Verify Windows Networking Components Preparing Your Computers for TCP/IP NetworkingPreparing Your PCs for Network Access Locate your Network Neighborhood icon Choose Settings, and then Control PanelPrimary Network Logon is set to Windows logon Verifying TCP/IP Properties Selecting Windows’ Internet Access MethodConfiguring Windows 2000 or XP for TCP/IP Networking Dhcp Configuration of TCP/IP in Windows XP Dhcp Configuration of TCP/IP in Windows XP orTCP/IP details are presented on Support tab Verify that Obtain an IP address Dhcp Configuration of TCP/IP in WindowsRight click on Local Area Connection and select Properties Obtain an IP address automatically is selected Verifying TCP/IP Properties for Windows XP or Preparing Your PCs for Network Access List of Glossary Terms GlossaryAdsl EAP Internet service provider Megabits per second Ssid WEP Glossary Numerics Index
Related manuals
Manual 2 pages 10.78 Kb