Appendix A
Specifications
Specifications for the WG302 | |
Appendix B |
|
Wireless Networking Basics |
|
Wireless Networking Overview | |
Infrastructure Mode | |
Ad Hoc Mode | |
Network Name: Extended Service Set Identification (ESSID) | |
Authentication and WEP Data Encryption | |
802.11 Authentication | |
Open System Authentication | |
Shared Key Authentication | |
Overview of WEP Parameters | |
Key Size | |
WEP Configuration Options | |
Wireless Channels | |
WPA Wireless Security | |
How Does WPA Compare to WEP? | |
How Does WPA Compare to IEEE 802.11i? | |
What are the Key Features of WPA Security? | |
WPA Authentication: |
|
Authentication via 802.1x/EAP and RADIUS | |
WPA Data Encryption Key Management | |
Is WPA Perfect? | |
Product Support for WPA | |
Supporting a Mixture of WPA and WEP Wireless Clients is Discouraged | |
Changes to Wireless Access Points | |
Changes to Wireless Network Adapters | |
Changes to Wireless Client Programs | |
Appendix C |
|
Command Line Reference |
|
Command Sets | |
Glossary |
|
Index |
|
Contents | v |
September 2004