NETGEAR WG511U WPA Data Encryption Key Management, Temporal Key Integrity Protocol Tkip, Michael

Page 71

User’s Manual for the NETGEAR Double 108 Mbps Wireless PC Card 32-bit CardBus WG511U

Note: For environments with a Remote Authentication Dial-In User Service (RADIUS) infrastructure, WPA supports Extensible Authentication Protocol (EAP). For environments without a RADIUS infrastructure, WPA supports the use of a preshared key.

Together, these technologies provide a framework for strong user authentication.

WPA Data Encryption Key Management

With 802.1x, the rekeying of unicast encryption keys is optional. Additionally, 802.11 and 802.1x provide no mechanism to change the global encryption key used for multicast and broadcast traffic. With WPA, rekeying of both unicast and global encryption keys is required.

For the unicast encryption key, the Temporal Key Integrity Protocol (TKIP) changes the key for every frame, and the change is synchronized between the wireless client and the wireless access point (AP). For the global encryption key, WPA includes a facility (the Information Element) for the wireless AP to advertise the changed key to the connected wireless clients.

If configured to implement dynamic key exchange, the 802.1x authentication server can return session keys to the access point along with the accept message. The access point uses the session keys to build, sign and encrypt an EAP key message that is sent to the client immediately after sending the success message. The client can then use contents of the key message to define applicable encryption keys. In typical 802.1x implementations, the client can automatically change encryption keys as often as necessary to minimize the possibility of eavesdroppers having enough time to crack the key in current use.

Temporal Key Integrity Protocol (TKIP)

WPA uses TKIP to provide important data encryption enhancements including a per-packet key mixing function, a message integrity check (MIC) named Michael, an extended initialization vector (IV) with sequencing rules, and a re-keying mechanism. TKIP also provides for the following:

The verification of the security configuration after the encryption keys are determined.

The synchronized changing of the unicast encryption key for each frame.

The determination of a unique starting unicast encryption key for each preshared key authentication.

Michael

Wireless Networking Basics

B-19

August 2004

Image 71
Contents August Technical Support FCC Information to User Export Restrictions Contents Chapter Wireless Security Configuration Glossary Contents Audience, Conventions, Publication Date Chapter About This ManualHtml version of this manual How to Navigate this ManualHow to Print this Manual About This Manual Chapter Introduction Key Features and Related Netgear ProductsWhat’s in the Box? 802.11a and 802.11b/g Wireless NetworkingRoad Map for How to Get There From Here Road Map for ‘How to Get There From Here’Netgear Double Exchange files Use printers Verifying System Requirements Chapter Basic SetupWhat You Need Before You Begin Observing Location and Range Guidelines Two Basic Operating ModesWG511U Default Wireless Configuration Settings Click Install Driver and Utility Basic Installation InstructionsFor Windows XP Users Installing a WG511U Basic Setup Wireless Security Configuration Configure your WG511ULED Descriptions Verify wireless connectivity to your networkFor Windows 2000 & 98/Me Users Installing a WG511U Found New Hardware Wizard Profile Configure your WG511U and saveBelow Word Meaning Interpreting the LED on the WG511U WG511U Wireless Connection IndicatorsColor Condition Description Interpreting System Tray Icon ColorsBasic Tips TroubleshootingTroubleshooting Frequently Asked Questions Basic Setup Using Configuration Profiles Chapter Netgear Smart Wireless WizardUnderstanding the Configuration Options Connecting to an Access Point in Infrastructure Mode Save your settings in a Profile How to Configure an Infrastructure Mode ProfileRun the WG511U Smart Wireless Wizard Configure the wireless network settingsNetgear WG511U Wireless PC Card in Computer-to-Computer Mode Connecting to Another PC in Ad-hoc ModeConfigure the PC network settings How to Configure an Ad-hoc Mode NetworkAd-Hoc Setting What’s on the Statistics Page? Understanding the Advanced Settings Understanding the Security Options Chapter Wireless Security ConfigurationBasic Requirements for WEP Using WEP SecurityWEP Security Encryption Key WEP Security Settings WorksheetWireless Network Name Ssid Configure the WEP settings How to Configure WEP Encryption SecurityConfigure the Network Name Ssid settings Basic Requirements for WPA-PSK Using WPA-PSK Advanced SecurityHow to Configure WPA-PSK Advanced Security WPA-PSK Security Settings WorksheetWPA-PSK settings screen Configure the WPA-PSK settingsWireless Security Configuration FCC, CE Appendix a Technical SpecificationsTechnical Specifications Infrastructure Mode Appendix B Wireless Networking BasicsWireless Networking Overview Wireless Channels Ad Hoc Mode Peer-to-Peer WorkgroupNetwork Name Extended Service Set Identification Essid 802.11b/g Wireless Channels 802.11a Legal Power Output and Wireless Channels WG511U user can use thirteen channels in non-turbomode WPA Wireless Security OverviewCisco Leap WEP AuthenticationWEP Overview 802.1xAuthentication Open System Steps Bit WEP WEP KeysWEP Key Configuration How to Use WEP Parameters802.1x Port Based Network Access Control Figure B-4 802.1x authentication WPA Wireless Security How Does WPA Compare to WEP? How Does WPA Compare to Ieee 802.11i? What are the Key Features of WPA Security?Figure B-5 WPA Overview Figure B-6 WPA/802.1x Authentication Sequence Wireless Networking Basics Michael WPA Data Encryption Key ManagementTemporal Key Integrity Protocol Tkip AES Support Is WPA Perfect?Product Support for WPA Wireless network adapters Wireless client programs Wireless Networking Basics Preparing Your Computers for TCP/IP Networking Appendix C Preparing Your PCs for Network AccessConfiguring Windows 98 and Me for TCP/IP Networking Install or Verify Windows Networking ComponentsPreparing Your PCs for Network Access Locate your Network Neighborhood icon Choose Settings, and then Control PanelPrimary Network Logon is set to Windows logon Verifying TCP/IP Properties Selecting Windows’ Internet Access MethodConfiguring Windows 2000 or XP for TCP/IP Networking Dhcp Configuration of TCP/IP in Windows XP Dhcp Configuration of TCP/IP in Windows XP orTCP/IP details are presented on Support tab Right click on Local Area Connection and select Properties Dhcp Configuration of TCP/IP in WindowsVerify that Obtain an IP address Obtain an IP address automatically is selected Verifying TCP/IP Properties for Windows XP or Preparing Your PCs for Network Access List of Glossary Terms GlossaryAdsl EAP Internet service provider Megabits per second Ssid WEP Glossary Numerics Index
Related manuals
Manual 2 pages 10.78 Kb