NETGEAR WG511U user manual How to Use WEP Parameters, WEP Key Configuration

Page 62

User’s Manual for the NETGEAR Double 108 Mbps Wireless PC Card 32-bit CardBus WG511U

When configured for 128-bit encryption, 802.11 products typically support four WEP Keys but some manufacturers support only one 128-bit key. The 128-bit WEP Key is expressed as 13 sets of two hexadecimal digits (0-9 and A-F). For example, “12 34 56 78 90 AB CD EF 12 34 56 78 90” is a 128-bit WEP Key.

Typically, 802.11 access points can store up to four 128-bit WEP Keys but some 802.11 client adapters can only store one. Therefore, make sure that your 802.11 access and client adapters configurations match.

WEP Key Configuration

Whatever keys you enter for an AP, you must also enter the same keys for the client adapter in the same order. In other words, WEP key 1 on the AP must match WEP key 1 on the client adapter, WEP key 2 on the AP must match WEP key 2 on the client adapter, etc.

Note: The AP and the client adapters can have different default WEP Keys as long as the keys are in the same order. In other words, the AP can use WEP key 2 as its default key to transmit while a client adapter can use WEP key 3 as its default key to transmit. The two devices will communicate as long as the AP’s WEP key 2 is the same as the client’s WEP key 2 and the AP’s WEP key 3 is the same as the client’s WEP key 3.

How to Use WEP Parameters

Wired Equivalent Privacy (WEP) data encryption is used when the wireless devices are configured to operate in Shared Key authentication mode. There are two shared key methods implemented in most commercially available products, 64-bit and 128-bit WEP data encryption.

Before enabling WEP on an 802.11 network, you must first consider what type of encryption you require and the key size you want to use. Typically, there are three WEP Encryption options available for 802.11 products:

1.Does Not Use WEP: The 802.11 network does not encrypt data. For authentication purposes, the network uses Open System Authentication.

2.Uses WEP for Encryption: A transmitting device encrypts the data portion of every packet it sends using a configured WEP Key. The receiving device decrypts the data using the same WEP Key. For authentication purposes, the network uses Open System Authentication.

3.Uses WEP for Authentication and Encryption: A transmitting device encrypts the data portion of every packet it sends using a configured WEP Key. The receiving device decrypts the data using the same WEP Key. For authentication purposes, the network uses Shared Key Authentication.

B-10

Wireless Networking Basics

August 2004

Image 62
Contents August Technical Support FCC Information to User Export Restrictions Contents Chapter Wireless Security Configuration Glossary Contents Chapter About This Manual Audience, Conventions, Publication DateHow to Navigate this Manual Html version of this manualHow to Print this Manual About This Manual Key Features and Related Netgear Products Chapter Introduction802.11a and 802.11b/g Wireless Networking What’s in the Box?Road Map for ‘How to Get There From Here’ Road Map for How to Get There From HereNetgear Double Exchange files Use printers Verifying System Requirements Chapter Basic SetupWhat You Need Before You Begin Two Basic Operating Modes Observing Location and Range GuidelinesWG511U Default Wireless Configuration Settings Click Install Driver and Utility Basic Installation InstructionsFor Windows XP Users Installing a WG511U Basic Setup Configure your WG511U Wireless Security ConfigurationVerify wireless connectivity to your network LED DescriptionsFor Windows 2000 & 98/Me Users Installing a WG511U Found New Hardware Wizard Configure your WG511U and save ProfileBelow Word Meaning WG511U Wireless Connection Indicators Interpreting the LED on the WG511UInterpreting System Tray Icon Colors Color Condition DescriptionTroubleshooting Basic TipsTroubleshooting Frequently Asked Questions Basic Setup Using Configuration Profiles Chapter Netgear Smart Wireless WizardUnderstanding the Configuration Options Connecting to an Access Point in Infrastructure Mode Configure the wireless network settings How to Configure an Infrastructure Mode ProfileRun the WG511U Smart Wireless Wizard Save your settings in a ProfileConnecting to Another PC in Ad-hoc Mode Netgear WG511U Wireless PC Card in Computer-to-Computer ModeHow to Configure an Ad-hoc Mode Network Configure the PC network settingsAd-Hoc Setting What’s on the Statistics Page? Understanding the Advanced Settings Chapter Wireless Security Configuration Understanding the Security OptionsUsing WEP Security Basic Requirements for WEPWEP Security Encryption Key WEP Security Settings WorksheetWireless Network Name Ssid Configure the WEP settings How to Configure WEP Encryption SecurityConfigure the Network Name Ssid settings Using WPA-PSK Advanced Security Basic Requirements for WPA-PSKWPA-PSK Security Settings Worksheet How to Configure WPA-PSK Advanced SecurityConfigure the WPA-PSK settings WPA-PSK settings screenWireless Security Configuration Appendix a Technical Specifications FCC, CETechnical Specifications Infrastructure Mode Appendix B Wireless Networking BasicsWireless Networking Overview Wireless Channels Ad Hoc Mode Peer-to-Peer WorkgroupNetwork Name Extended Service Set Identification Essid 802.11b/g Wireless Channels 802.11a Legal Power Output and Wireless Channels WG511U user can use thirteen channels in non-turbomode Wireless Security Overview WPA802.1x WEP AuthenticationWEP Overview Cisco LeapAuthentication Open System Steps WEP Keys Bit WEPHow to Use WEP Parameters WEP Key Configuration802.1x Port Based Network Access Control Figure B-4 802.1x authentication WPA Wireless Security How Does WPA Compare to WEP? What are the Key Features of WPA Security? How Does WPA Compare to Ieee 802.11i?Figure B-5 WPA Overview Figure B-6 WPA/802.1x Authentication Sequence Wireless Networking Basics Michael WPA Data Encryption Key ManagementTemporal Key Integrity Protocol Tkip AES Support Is WPA Perfect?Product Support for WPA Wireless network adapters Wireless client programs Wireless Networking Basics Install or Verify Windows Networking Components Appendix C Preparing Your PCs for Network AccessConfiguring Windows 98 and Me for TCP/IP Networking Preparing Your Computers for TCP/IP NetworkingPreparing Your PCs for Network Access Choose Settings, and then Control Panel Locate your Network Neighborhood iconPrimary Network Logon is set to Windows logon Selecting Windows’ Internet Access Method Verifying TCP/IP PropertiesConfiguring Windows 2000 or XP for TCP/IP Networking Dhcp Configuration of TCP/IP in Windows XP or Dhcp Configuration of TCP/IP in Windows XPTCP/IP details are presented on Support tab Right click on Local Area Connection and select Properties Dhcp Configuration of TCP/IP in WindowsVerify that Obtain an IP address Obtain an IP address automatically is selected Verifying TCP/IP Properties for Windows XP or Preparing Your PCs for Network Access Glossary List of Glossary TermsAdsl EAP Internet service provider Megabits per second Ssid WEP Glossary Index Numerics
Related manuals
Manual 2 pages 10.78 Kb