NETGEAR WG511U user manual Ssid

Page 92

User’s Manual for the NETGEAR Double 108 Mbps Wireless PC Card 32-bit CardBus WG511U

Routing Information Protocol

RIP. A protocol in which routers periodically exchange information with one another so that they can determine minimum distance paths between sources and destinations.

router

A device that forwards data between networks. An IP router forwards data based on IP source and destination addresses.

SSID

A Service Set Identification is a thirty-two character (maximum) alphanumeric key identifying a wireless local area network. For the wireless devices in a network to communicate with each other, all devices must be configured with the same SSID. This is typically the configuration parameter for a wireless PC card. It corresponds to the ESSID in the wireless Access Point and to the wireless network name. See also Wireless Network Name and ESSID.

Subnet Mask

A mask used to determine what subnet an IP address belongs to. Subnetting enables a network administrator to further divide an IP address into two or more subnets.

TCP/IP

The main internetworking protocols used in the Internet. The Internet Protocol (IP) used in conjunction with the Transfer Control Protocol (TCP) form TCP/IP.

TLS

Short for Transport Layer Security, a protocol that guarantees privacy and data integrity between client/ server applications communicating over the Internet. The TLS protocol is made up of two layers:

The TLS Record Protocol -- layered on top of a reliable transport protocol, such as TCP, it ensures that the connection is private by using symmetric data encryption and it ensures that the connection is reliable. The TLS Record Protocol also is used for encapsulation of higher-level protocols, such as the TLS Handshake Protocol.

The TLS Handshake Protocol -- allows authentication between the server and client and the negotiation of an encryption algorithm and cryptographic keys before the application protocol transmits or receives any data.

TLS is application protocol-independent. Higher-level protocols can layer on top of the TLS protocol transparently. Based on Netscape’s SSL 3.0, TLS supercedes and is an extension of SSL. TLS and SSL are not interoperable.

WAN

A long distance link used to extend or connect remotely located local area networks. The Internet is a large WAN.

6

Glossary

August 2004

Image 92
Contents August Technical Support FCC Information to User Export Restrictions Contents Chapter Wireless Security Configuration Glossary Contents Chapter About This Manual Audience, Conventions, Publication DateHow to Navigate this Manual Html version of this manualHow to Print this Manual About This Manual Key Features and Related Netgear Products Chapter Introduction802.11a and 802.11b/g Wireless Networking What’s in the Box?Road Map for ‘How to Get There From Here’ Road Map for How to Get There From HereNetgear Double Exchange files Use printers Verifying System Requirements Chapter Basic SetupWhat You Need Before You Begin Two Basic Operating Modes Observing Location and Range GuidelinesWG511U Default Wireless Configuration Settings Click Install Driver and Utility Basic Installation InstructionsFor Windows XP Users Installing a WG511U Basic Setup Configure your WG511U Wireless Security ConfigurationVerify wireless connectivity to your network LED DescriptionsFor Windows 2000 & 98/Me Users Installing a WG511U Found New Hardware Wizard Configure your WG511U and save ProfileBelow Word Meaning WG511U Wireless Connection Indicators Interpreting the LED on the WG511UInterpreting System Tray Icon Colors Color Condition DescriptionTroubleshooting Basic TipsTroubleshooting Frequently Asked Questions Basic Setup Using Configuration Profiles Chapter Netgear Smart Wireless WizardUnderstanding the Configuration Options Connecting to an Access Point in Infrastructure Mode How to Configure an Infrastructure Mode Profile Run the WG511U Smart Wireless WizardConfigure the wireless network settings Save your settings in a ProfileConnecting to Another PC in Ad-hoc Mode Netgear WG511U Wireless PC Card in Computer-to-Computer ModeHow to Configure an Ad-hoc Mode Network Configure the PC network settingsAd-Hoc Setting What’s on the Statistics Page? Understanding the Advanced Settings Chapter Wireless Security Configuration Understanding the Security OptionsUsing WEP Security Basic Requirements for WEPWEP Security Encryption Key WEP Security Settings WorksheetWireless Network Name Ssid Configure the WEP settings How to Configure WEP Encryption SecurityConfigure the Network Name Ssid settings Using WPA-PSK Advanced Security Basic Requirements for WPA-PSKWPA-PSK Security Settings Worksheet How to Configure WPA-PSK Advanced SecurityConfigure the WPA-PSK settings WPA-PSK settings screenWireless Security Configuration Appendix a Technical Specifications FCC, CETechnical Specifications Infrastructure Mode Appendix B Wireless Networking BasicsWireless Networking Overview Wireless Channels Ad Hoc Mode Peer-to-Peer WorkgroupNetwork Name Extended Service Set Identification Essid 802.11b/g Wireless Channels 802.11a Legal Power Output and Wireless Channels WG511U user can use thirteen channels in non-turbomode Wireless Security Overview WPAWEP Authentication WEP Overview802.1x Cisco LeapAuthentication Open System Steps WEP Keys Bit WEPHow to Use WEP Parameters WEP Key Configuration802.1x Port Based Network Access Control Figure B-4 802.1x authentication WPA Wireless Security How Does WPA Compare to WEP? What are the Key Features of WPA Security? How Does WPA Compare to Ieee 802.11i?Figure B-5 WPA Overview Figure B-6 WPA/802.1x Authentication Sequence Wireless Networking Basics Michael WPA Data Encryption Key ManagementTemporal Key Integrity Protocol Tkip AES Support Is WPA Perfect?Product Support for WPA Wireless network adapters Wireless client programs Wireless Networking Basics Appendix C Preparing Your PCs for Network Access Configuring Windows 98 and Me for TCP/IP NetworkingInstall or Verify Windows Networking Components Preparing Your Computers for TCP/IP NetworkingPreparing Your PCs for Network Access Choose Settings, and then Control Panel Locate your Network Neighborhood iconPrimary Network Logon is set to Windows logon Selecting Windows’ Internet Access Method Verifying TCP/IP PropertiesConfiguring Windows 2000 or XP for TCP/IP Networking Dhcp Configuration of TCP/IP in Windows XP or Dhcp Configuration of TCP/IP in Windows XPTCP/IP details are presented on Support tab Right click on Local Area Connection and select Properties Dhcp Configuration of TCP/IP in WindowsVerify that Obtain an IP address Obtain an IP address automatically is selected Verifying TCP/IP Properties for Windows XP or Preparing Your PCs for Network Access Glossary List of Glossary TermsAdsl EAP Internet service provider Megabits per second Ssid WEP Glossary Index Numerics
Related manuals
Manual 2 pages 10.78 Kb