NETGEAR WG302 How Does WPA Compare to Ieee 802.11i?, What are the Key Features of WPA Security?

Page 86

Reference Manual for the NETGEAR ProSafe Wireless Access Point 802.11g WG302

How Does WPA Compare to IEEE 802.11i?

WPA will be forward compatible with the IEEE 802.11i security specification currently under development. WPA is a subset of the current 802.11i draft and uses certain pieces of the 802.11i draft that are ready to bring to market today, such as 802.1x and TKIP. The main pieces of the 802.11i draft that are not included in WPA are secure IBSS (Ad-Hoc mode), secure fast handoff (for specialized 802.11 VoIP phones), as well as enhanced encryption protocols, such as AES-CCMP. These features are either not yet ready for market or will require hardware upgrades to implement.

What are the Key Features of WPA Security?

The following security features are included in the WPA standard:

WPA Authentication

WPA Encryption Key Management

Temporal Key Integrity Protocol (TKIP)

Michael message integrity code (MIC)

AES Support (to be phased in)

Support for a Mixture of WPA and WEP Wireless Clients, but mixing WEP and WPA is discouraged

These features are discussed below.

WPA addresses most of the known WEP vulnerabilities and is primarily intended for wireless infrastructure networks as found in the enterprise. This infrastructure includes stations, access points, and authentication servers (typically RADIUS servers). The RADIUS server holds (or has access to) user credentials (for example, user names and passwords) and authenticates wireless users before they gain access to the network.

The strength of WPA comes from an integrated sequence of operations that encompass 802.1X/ EAP authentication and sophisticated key management and encryption techniques. Its major operations include:

Network security capability determination. This occurs at the 802.11 level and is communicated through WPA information elements in Beacon, Probe Response, and (Re) Association Requests. Information in these elements includes the authentication method (802.1X or Pre-shared key) and the preferred cipher suite (WEP, TKIP, or AES).

B-10

Wireless Networking Basics

September 2004

Image 86
Contents September Technical Support Placement and Range Guidelines Declaration of Conformity Industry Canada Compliance Statement September Contents Chapter Management Appendix a Specifications Contents Chapter About This Manual Audience, Versions, ConventionsHow to Use this Manual Html version of this manualHow to Print this Manual About This Manual Chapter Introduction Key Features Supported Standards and ConventionsAutoCell-The Self-Organizing Wireless Network Compatible and Related Netgear Products 802.11g Standards-based Wireless NetworkingAutosensing Ethernet Connections with Auto Uplink System Requirements What’s In the Box?Following table explains the LED indicators Hardware DescriptionLED Description Male DB-9 serial port for serial DTE connections This socket connects to the WG302 12V 1.2A power adapterWG302 provides two detachable antenna Introduction Chapter Basic Installation and Configuration Observing Placement and Range GuidelinesCabling Requirements Default Factory Settings Feature Factory Default SettingsUnderstanding WG302 Wireless Security Options LUHOHVVDWD 6HFXULW\2SWLRQVInstalling the WG302 Access Point SET UP the WG302 Access PointLogin window Web browser will then display the WG302 settings Login result WG302 homeConfigure the settings appropriate for your network Basic Settings menuDeploy the WG302 Access Point Verify Wireless Connectivity How to Log In to the WG302 Using Its Default IP Address Understanding Basic Wireless Settings Basic Installation and Configuration Understanding WEP/WPA Security Options Wireless Security Settings Field Description Security Encryption Field Description WPA-PSK Wi-Fi Before You Change the Ssid and WEP Settings KeyHow to Set Up and Test Basic Wireless Connectivity How to Restrict Wireless Access by MAC Address Select the Turn Access Control On check boxClick Apply to save your settings How to Configure WEPTo configure WEP data encryption, follow these steps How to Configure WPA How to Configure WPA-PSKUsing the Basic IP Settings Options 10 Wireless Settings menuAccess Point Name NetBIOS Select the time zone location for your setting Time ZoneThese settings appear below the connector on the back panel Using the Secure Telnet InterfaceHow to Use the CLI via the Console Port Chapter ManagementCLI Commands Press the return key, and the screen below should appearUsing Syslog and Activity Log Information Syslog and Activity Log informationViewing General, Log, Station, and Statistical Information This screen shows the following parametersStatistics Field DescriptionWireless Access Point Status screen Statistics Fields Upgrading the Wireless Access Point Software Viewing a List of Attached DevicesConfiguration File Management Saving and Retrieving the Configuration Settings Backup menuChanging the Administrator Password Restoring the WG302 to the Factory Default SettingsUsing the Reset Button to Restore Factory Default Settings Set Password menu Management Chapter Advanced Configuration Understanding Advanced IP Settings for Wireless ClientsUnderstanding Advanced Wireless Settings AutoCell RF ManagementConfiguration AutoCell RF management is enabled by defaultAdditional AutoCell View Management Options Configuring Wireless LAN Parameters Table below describes the advanced wireless parametersEnabling Wireless Bridging and Repeating Advanced Wireless Settings Access Point Mode settingsHow to Configure a WG302 as a Point-to-Point Bridge Point-to-Point BridgeHow to Configure Multi Configure the Operating Mode WG302 AP1 on LANHow to Configure Wireless Repeating Advanced Configuration Chapter Troubleshooting No lights are lit on the access pointWireless LAN activity light does not light up LAN light is not litCannot connect to the WG302 to configure it When I enter a URL or IP address I get a timeout errorUsing the Reset Button to Restore Factory Default Settings Appendix a Specifications Specifications for the WG302Specifications Infrastructure Mode Appendix B Wireless Networking BasicsWireless Networking Overview This chapter provides an overview of Wireless networkingNetwork Name Extended Service Set Identification Essid Authentication and WEP Data EncryptionAd Hoc Mode Peer-to-Peer Workgroup Authentication Open System AuthenticationShared Key Authentication $XWKHQWLFDWLRQ6WHSVOverview of WEP Parameters Sends Iteback TOO!0Key Size Wireless Channels WEP Configuration OptionsWPA Wireless Security How Does WPA Compare to WEP? What are the Key Features of WPA Security? How Does WPA Compare to Ieee 802.11i?Wireless Networking Basics Figure B-3 WPA Overview Access point replies with an EAP-request identity message Figure B-4 802.1x Authentication SequenceWPA Data Encryption Key Management Temporal Key Integrity Protocol Tkip Is WPA Perfect? Product Support for WPAOpen system, then 802.1x EAP with Radius or preshared key Open system, then 802.1x supplicant EAP or preshared keyChanges to Wireless Client Programs Appendix C Command Line Reference Command SetsCommand Line Reference Command Line Reference Command Line Reference Glossary Dhcp DSL Internet service provider Radius TLS Wins Glossary Index NumericsWEP B-3
Related manuals
Manual 34 pages 38.47 Kb