NETGEAR WG102 manual Is WPA Perfect?, Product Support for WPA

Page 90

Reference Manual for the NETGEAR WG102 ProSafe 802.11g Wireless Access Point

Is WPA Perfect?

WPA is not without its vulnerabilities. Specifically, it is susceptible to denial of service (DoS) attacks. If the access point receives two data packets that fail the message integrity code (MIC) within 60 seconds of each other, then the network is under an active attack, and as a result, the access point employs counter measures, which include disassociating each station using the access point. This prevents an attacker from gleaning information about the encryption key and alerts administrators, but it also causes users to lose network connectivity for 60 seconds. More than anything else, this may just prove that no single security tactic is completely invulnerable. WPA is a definite step forward in WLAN security over WEP and has to be thought of as a single part of an end-to-end network security strategy.

Product Support for WPA

Starting in August, 2003, NETGEAR, Inc. wireless Wi-Fi certified products will support the WPA standard. NETGEAR, Inc. wireless products that had their Wi-Fi certification approved before August, 2003 will have one year to add WPA so as to maintain their Wi-Fi certification.

WPA requires software changes to the following:

Wireless access points

Wireless network adapters

Wireless client programs

Supporting a Mixture of WPA and WEP Wireless Clients is Discouraged

To support the gradual transition of WEP-based wireless networks to WPA, a wireless AP can support both WEP and WPA clients at the same time. During the association, the wireless AP determines which clients use WEP and which clients use WPA. The disadvantage to supporting a mixture of WEP and WPA clients is that the global encryption key is not dynamic. This is because WEP-based clients cannot support it. All other benefits to the WPA clients, such as integrity, are maintained.

However, a mixed mode supporting WPA and non-WPA clients would offer network security that is no better than that obtained with a non-WPA network, and thus this mode of operation is discouraged.

B-16

Wireless Networking Basics

October 2004

Image 90
Contents October Technical Support FCC Statement RF Exposure Warning for North America, and Australia Antenna Statement for North America and Australia 0681 Requirements For Operation in the European Community October Antenna Statement for the European Community October Contents Appendix a Specifications Appendix B Wireless Networking Basics Contents Chapter About This Manual Audience, Versions, ConventionsHow to Use this Manual Html version of this manualHow to Print this Manual About This Manual Chapter Introduction Key Features Supported Standards and Conventions802.11g Standards-based Wireless Networking Autosensing Ethernet Connections with Auto UplinkSystem Requirements Compatible and Related Netgear ProductsWhat’s In the Box? Hardware Description Need Product Photo Or IllustrationDetachable Antenna Chapter Basic Installation and Configuration Observing Placement and Range GuidelinesCabling Requirements Default Factory Settings Feature Factory Default SettingsUnderstanding WG102 Wireless Security Options LUHOHVVDWD 6HFXULW\2SWLRQVInstalling the WG102 Access Point SET UP the WG102 Access PointLogin window Web browser will then display the WG102 settings Configure the settings appropriate for your network Deploy the WG102 Access Point Verify Wireless Connectivity How to Log In to the WG102 Using Its Default IP Address Understanding Basic Wireless Settings Basic Installation and Configuration Wireless Security Settings Understanding WEP/WPA Security OptionsWireless LAN options are explained in the following table Field Description WPA-PSK Wi-Fi Before You Change the Ssid and WEP Settings WEP Encryption KeysHow to Set Up and Test Basic Wireless Connectivity How to Restrict Wireless Access by MAC Address Select the Turn Access Control On check boxHow to Configure WEP To configure WEP data encryption, follow these stepsHow to Configure WPA 11 Wireless Settings menu How to Configure WPA-PSK 13 Wireless Settings menuUsing the Basic IP Settings Options IP AddressTime Zone Using Syslog and Activity Log Information Chapter ManagementViewing General, Log, Station, and Statistical Information This screen shows the following parametersGeneral Information Fields Field Description Wired Ethernet Received/Transmitted StatisticsUpgrading the Wireless Access Point Software Viewing a List of Attached DevicesConfiguration File Management Settings Backup menuSaving and Retrieving the Configuration Restoring the WG102 to the Factory Default SettingsUsing the Reset Button to Restore Factory Default Settings Changing the Administrator Password Set Password menuUsing Snmp Remote Management Remote Management settingsManagement Chapter Advanced Configuration Hotspot SettingsConfiguring Advanced Wireless Settings Table below describes the advanced wireless parametersAP Settings Enabling Wireless Bridging and Repeating Point-to-Point BridgeHow to Configure a WG102 as a Point-to-Point Bridge Repeater with Wireless Client AssociationHow to Configure Multi-Point Wireless Bridging Multi-Point bridgingAdvanced Configuration How to Configure Wireless Repeating Advanced Configuration Chapter Troubleshooting No lights are lit on the access pointWireless LAN activity light does not light up LAN light is not litCannot connect to the WG102 to configure it When I enter a URL or IP address I get a timeout errorUsing the Reset Button to Restore Factory Default Settings October Appendix a Specifications Specifications for the WG102WPA Appendix B Wireless Networking Basics Wireless Networking OverviewInfrastructure Mode Authentication and WEP Data Encryption Ad Hoc Mode Peer-to-Peer WorkgroupNetwork Name Extended Service Set Identification Essid Authentication Open System Authentication802.11b Authentication Open System Steps 802.11b Authentication Shared Key Steps Key Size Wireless Channels WEP Configuration OptionsWPA Wireless Security How Does WPA Compare to WEP? What are the Key Features of WPA Security? How Does WPA Compare to Ieee 802.11i?Wireless Networking Basics Figure B-3 WPA Overview Access point replies with an EAP-request identity message WPA Data Encryption Key Management Temporal Key Integrity Protocol Tkip Is WPA Perfect? Product Support for WPAChanges to Wireless Access Points Changes to Wireless Client Programs Glossary Dhcp DSL Internet service provider Radius TLS Wins Glossary Index NumericsWEP B-3
Related manuals
Manual 2 pages 31.24 Kb Manual 23 pages 35.1 Kb Manual 2 pages 35.77 Kb