NETGEAR WG511U user manual WPA Wireless Security

Page 65

User’s Manual for the NETGEAR Double 108 Mbps Wireless PC Card 32-bit CardBus WG511U

7.If the authentication server accepts the client, then the access point will transition the client's port to an authorized state and forward additional traffic.

Initial 802.1x communications begin with an unauthenticated supplicant (i.e., client device) attempting to connect with an authenticator (i.e., 802.11 access point). The access point responds by enabling a port for passing only EAP packets from the client to an authentication server located on the wired side of the access point. The access point blocks all other traffic, such as HTTP, DHCP, and POP3 packets, until the access point can verify the client's identity using an authentication server (e.g., RADIUS). Once authenticated, the access point opens the client's port for other types of traffic.

The basic 802.1x protocol provides effective authentication and can offering dynamic key management using 802.1x as a delivery mechanism. If configured to implement dynamic key exchange, the 802.1x authentication server can return session keys to the access point along with the accept message. The access point uses the session keys to build, sign and encrypt an EAP key message that is sent to the client immediately after sending the success message. The client can then use contents of the key message to define applicable encryption keys. In typical 802.1x implementations, the client can automatically change encryption keys as often as necessary to minimize the possibility of eavesdroppers having enough time to crack the key in current use.

It's important to note that 802.1x doesn't provide the actual authentication mechanisms. When using 802.1x, you need to choose an EAP type, such as Transport Layer Security (EAP-TLS) or Protected EAP (PEAP), which defines how the authentication takes place.

The important part to know at this point is that the software supporting the specific EAP type resides on the authentication server and within the operating system or application software on the client devices. The wireless access point acts as a “pass through” for 802.1x messages. As a result, you can update the EAP authentication type as newer types become available and your requirements for security change.

802.1x is well on its way to becoming an industry standard, and provides an effective wired and wireless LAN security solution. Windows XP implements 802.1x natively, and the NETGEAR Double 108 Mbps Wireless PC Card 32-bit CardBus WG511U supports 802.1x. The 802.11i committee is specifying the use of 802.1x to eventually become part of the 802.11 standard.

WPA Wireless Security

Wi-Fi Protected Access (WPA) is a specification of standards-based, interoperable security enhancements that increase the level of data protection and access control for existing and future wireless LAN systems.

Wireless Networking Basics

B-13

August 2004

Image 65
Contents August Technical Support FCC Information to User Export Restrictions Contents Chapter Wireless Security Configuration Glossary Contents Audience, Conventions, Publication Date Chapter About This ManualHtml version of this manual How to Navigate this ManualHow to Print this Manual About This Manual Chapter Introduction Key Features and Related Netgear ProductsWhat’s in the Box? 802.11a and 802.11b/g Wireless NetworkingRoad Map for How to Get There From Here Road Map for ‘How to Get There From Here’Netgear Double Exchange files Use printers Verifying System Requirements Chapter Basic SetupWhat You Need Before You Begin Observing Location and Range Guidelines Two Basic Operating ModesWG511U Default Wireless Configuration Settings Click Install Driver and Utility Basic Installation InstructionsFor Windows XP Users Installing a WG511U Basic Setup Wireless Security Configuration Configure your WG511ULED Descriptions Verify wireless connectivity to your networkFor Windows 2000 & 98/Me Users Installing a WG511U Found New Hardware Wizard Profile Configure your WG511U and saveBelow Word Meaning Interpreting the LED on the WG511U WG511U Wireless Connection IndicatorsColor Condition Description Interpreting System Tray Icon ColorsBasic Tips TroubleshootingTroubleshooting Frequently Asked Questions Basic Setup Using Configuration Profiles Chapter Netgear Smart Wireless WizardUnderstanding the Configuration Options Connecting to an Access Point in Infrastructure Mode Run the WG511U Smart Wireless Wizard How to Configure an Infrastructure Mode ProfileConfigure the wireless network settings Save your settings in a ProfileNetgear WG511U Wireless PC Card in Computer-to-Computer Mode Connecting to Another PC in Ad-hoc ModeConfigure the PC network settings How to Configure an Ad-hoc Mode NetworkAd-Hoc Setting What’s on the Statistics Page? Understanding the Advanced Settings Understanding the Security Options Chapter Wireless Security ConfigurationBasic Requirements for WEP Using WEP SecurityWEP Security Encryption Key WEP Security Settings WorksheetWireless Network Name Ssid Configure the WEP settings How to Configure WEP Encryption SecurityConfigure the Network Name Ssid settings Basic Requirements for WPA-PSK Using WPA-PSK Advanced SecurityHow to Configure WPA-PSK Advanced Security WPA-PSK Security Settings WorksheetWPA-PSK settings screen Configure the WPA-PSK settingsWireless Security Configuration FCC, CE Appendix a Technical SpecificationsTechnical Specifications Infrastructure Mode Appendix B Wireless Networking BasicsWireless Networking Overview Wireless Channels Ad Hoc Mode Peer-to-Peer WorkgroupNetwork Name Extended Service Set Identification Essid 802.11b/g Wireless Channels 802.11a Legal Power Output and Wireless Channels WG511U user can use thirteen channels in non-turbomode WPA Wireless Security OverviewWEP Overview WEP Authentication802.1x Cisco LeapAuthentication Open System Steps Bit WEP WEP KeysWEP Key Configuration How to Use WEP Parameters802.1x Port Based Network Access Control Figure B-4 802.1x authentication WPA Wireless Security How Does WPA Compare to WEP? How Does WPA Compare to Ieee 802.11i? What are the Key Features of WPA Security?Figure B-5 WPA Overview Figure B-6 WPA/802.1x Authentication Sequence Wireless Networking Basics Michael WPA Data Encryption Key ManagementTemporal Key Integrity Protocol Tkip AES Support Is WPA Perfect?Product Support for WPA Wireless network adapters Wireless client programs Wireless Networking Basics Configuring Windows 98 and Me for TCP/IP Networking Appendix C Preparing Your PCs for Network AccessInstall or Verify Windows Networking Components Preparing Your Computers for TCP/IP NetworkingPreparing Your PCs for Network Access Locate your Network Neighborhood icon Choose Settings, and then Control PanelPrimary Network Logon is set to Windows logon Verifying TCP/IP Properties Selecting Windows’ Internet Access MethodConfiguring Windows 2000 or XP for TCP/IP Networking Dhcp Configuration of TCP/IP in Windows XP Dhcp Configuration of TCP/IP in Windows XP orTCP/IP details are presented on Support tab Right click on Local Area Connection and select Properties Dhcp Configuration of TCP/IP in WindowsVerify that Obtain an IP address Obtain an IP address automatically is selected Verifying TCP/IP Properties for Windows XP or Preparing Your PCs for Network Access List of Glossary Terms GlossaryAdsl EAP Internet service provider Megabits per second Ssid WEP Glossary Numerics Index
Related manuals
Manual 2 pages 10.78 Kb