NETGEAR WG302 manual Authentication and WEP Data Encryption, Ad Hoc Mode Peer-to-Peer Workgroup

Page 78

Reference Manual for the NETGEAR ProSafe Wireless Access Point 802.11g WG302

Ad Hoc Mode (Peer-to-Peer Workgroup)

In an ad hoc network, computers are brought together as needed; thus, there is no structure or fixed points to the network - each node can generally communicate with any other node. There is no Access Point involved in this configuration. This mode enables you to quickly set up a small wireless workgroup and allows workgroup members to exchange data or share printers as supported by Microsoft networking in the various Windows operating systems. Some vendors also refer to ad hoc networking as peer-to-peer group networking.

In this configuration, network packets are directly sent and received by the intended transmitting and receiving stations. As long as the stations are within range of one another, this is the easiest and least expensive way to set up a wireless network.

Network Name: Extended Service Set Identification (ESSID)

The Extended Service Set Identification (ESSID) is one of two types of Service Set Identification (SSID). In an ad hoc wireless network with no access points, the Basic Service Set Identification (BSSID) is used. In an infrastructure wireless network that includes an access point, the ESSID is used, but may still be referred to as SSID.

An SSID is a thirty-two character (maximum) alphanumeric key identifying the name of the wireless local area network. Some vendors refer to the SSID as network name. For the wireless devices in a network to communicate with each other, all devices must be configured with the same SSID.

The ESSID is usually broadcast in the air from an access point. The wireless station sometimes can be configured with the ESSID ANY. This means the wireless station will try to associate with whichever access point has the stronger radio frequency (RF) signal, providing that both the access point and wireless station use Open System authentication.

Authentication and WEP Data Encryption

The absence of a physical connection between nodes makes the wireless links vulnerable to eavesdropping and information theft. To provide a certain level of security, the IEEE 802.11 standard has defined these two types of authentication methods:

Open System. With Open System authentication, a wireless computer can join any network and receive any messages that are not encrypted.

B-2

Wireless Networking Basics

September 2004

Image 78
Contents September Technical Support Placement and Range Guidelines Declaration of Conformity Industry Canada Compliance Statement September Contents Chapter Management Appendix a Specifications Contents Chapter About This Manual Audience, Versions, ConventionsHow to Use this Manual Html version of this manualHow to Print this Manual About This Manual Chapter Introduction Key Features Supported Standards and ConventionsAutoCell-The Self-Organizing Wireless Network 802.11g Standards-based Wireless Networking Autosensing Ethernet Connections with Auto UplinkCompatible and Related Netgear Products System Requirements What’s In the Box?Following table explains the LED indicators Hardware DescriptionLED Description This socket connects to the WG302 12V 1.2A power adapter WG302 provides two detachable antennaMale DB-9 serial port for serial DTE connections Introduction Chapter Basic Installation and Configuration Observing Placement and Range GuidelinesCabling Requirements Default Factory Settings Feature Factory Default SettingsUnderstanding WG302 Wireless Security Options LUHOHVVDWD 6HFXULW\2SWLRQVInstalling the WG302 Access Point SET UP the WG302 Access PointLogin window Web browser will then display the WG302 settings Login result WG302 homeConfigure the settings appropriate for your network Basic Settings menuDeploy the WG302 Access Point Verify Wireless Connectivity How to Log In to the WG302 Using Its Default IP Address Understanding Basic Wireless Settings Basic Installation and Configuration Understanding WEP/WPA Security Options Wireless Security Settings Field Description Security Encryption Field Description WPA-PSK Wi-Fi Before You Change the Ssid and WEP Settings KeyHow to Set Up and Test Basic Wireless Connectivity How to Restrict Wireless Access by MAC Address Select the Turn Access Control On check boxHow to Configure WEP To configure WEP data encryption, follow these stepsClick Apply to save your settings How to Configure WPA How to Configure WPA-PSKUsing the Basic IP Settings Options 10 Wireless Settings menuAccess Point Name NetBIOS Select the time zone location for your setting Time ZoneThese settings appear below the connector on the back panel Using the Secure Telnet InterfaceHow to Use the CLI via the Console Port Chapter ManagementCLI Commands Press the return key, and the screen below should appearUsing Syslog and Activity Log Information Syslog and Activity Log informationViewing General, Log, Station, and Statistical Information This screen shows the following parametersStatistics Field DescriptionWireless Access Point Status screen Statistics Fields Upgrading the Wireless Access Point Software Viewing a List of Attached DevicesConfiguration File Management Saving and Retrieving the Configuration Settings Backup menuRestoring the WG302 to the Factory Default Settings Using the Reset Button to Restore Factory Default SettingsChanging the Administrator Password Set Password menu Management Chapter Advanced Configuration Understanding Advanced IP Settings for Wireless ClientsUnderstanding Advanced Wireless Settings AutoCell RF ManagementConfiguration AutoCell RF management is enabled by defaultAdditional AutoCell View Management Options Configuring Wireless LAN Parameters Table below describes the advanced wireless parametersEnabling Wireless Bridging and Repeating Advanced Wireless Settings Access Point Mode settingsHow to Configure a WG302 as a Point-to-Point Bridge Point-to-Point BridgeHow to Configure Multi Configure the Operating Mode WG302 AP1 on LANHow to Configure Wireless Repeating Advanced Configuration Chapter Troubleshooting No lights are lit on the access pointWireless LAN activity light does not light up LAN light is not litCannot connect to the WG302 to configure it When I enter a URL or IP address I get a timeout errorUsing the Reset Button to Restore Factory Default Settings Appendix a Specifications Specifications for the WG302Specifications Infrastructure Mode Appendix B Wireless Networking BasicsWireless Networking Overview This chapter provides an overview of Wireless networkingAuthentication and WEP Data Encryption Ad Hoc Mode Peer-to-Peer WorkgroupNetwork Name Extended Service Set Identification Essid Authentication Open System AuthenticationShared Key Authentication $XWKHQWLFDWLRQ6WHSVOverview of WEP Parameters Sends Iteback TOO!0Key Size Wireless Channels WEP Configuration OptionsWPA Wireless Security How Does WPA Compare to WEP? What are the Key Features of WPA Security? How Does WPA Compare to Ieee 802.11i?Wireless Networking Basics Figure B-3 WPA Overview Access point replies with an EAP-request identity message Figure B-4 802.1x Authentication SequenceWPA Data Encryption Key Management Temporal Key Integrity Protocol Tkip Is WPA Perfect? Product Support for WPAOpen system, then 802.1x EAP with Radius or preshared key Open system, then 802.1x supplicant EAP or preshared keyChanges to Wireless Client Programs Appendix C Command Line Reference Command SetsCommand Line Reference Command Line Reference Command Line Reference Glossary Dhcp DSL Internet service provider Radius TLS Wins Glossary Index NumericsWEP B-3
Related manuals
Manual 34 pages 38.47 Kb