NETGEAR CG814M manual Extended Service Set Identification Essid, Authentication and WEP Encryption

Page 83

Reference Manual for the Model CG814M Wireless Cable Modem Gateway

In the infrastructure mode, the wireless access point converts airwave data into wired Ethernet data, acting as a bridge between the wired LAN and wireless clients. Connecting multiple Access Points via a wired Ethernet backbone can further extend the wireless network coverage. As a mobile computing device moves out of the range of one access point, it moves into the range of another. As a result, wireless clients can freely roam from one Access Point domain to another and still maintain seamless network connection.

Extended Service Set Identification (ESSID)

The Extended Service Set Identification (ESSID) is one of two types of Service Set Identification (SSID). In an ad-hoc wireless network with no access points, the Basic Service Set Identification (BSSID) is used. In an infrastructure wireless network that includes an access point, the Extended Service Set Identification (ESSID) is used, but may still be referred to as SSID.

An SSID is a thirty-two character (maximum) alphanumeric key identifying the wireless local area network. Some vendors refer to the SSID as network name. For the wireless devices in a network to communicate with each other, all devices must be configured with the same SSID.

Authentication and WEP Encryption

The absence of a physical connection between nodes makes the wireless links vulnerable to eavesdropping and information theft. To provide a certain level of security, the IEEE 802.11 standard has defined two types of authentication methods, Open System and Shared Key. With Open System authentication, a wireless PC can join any network and receive any messages that are not encrypted. With Shared Key authentication, only those PCs that possess the correct authentication key can join the network. By default, IEEE 802.11 wireless devices operate in an Open System network.

Wired Equivalent Privacy (WEP) data encryption is utilized when the wireless nodes or access points are configured to operate in Shared Key authentication mode. There are two shared key methods implemented in most commercially available products, 64-bit and 128-bit WEP data encryption.

The 64-bit WEP data encryption method, allows for a five-character (40-bit) input. Additionally, 24 factory-set bits are added to the forty-bit input to generate a 64-bit encryption key. (The 24 factory-set bits are not user-configured). This encryption key will be used to encrypt/decrypt all data transmitted via the wireless interface. Some vendors refer to the 64-bit WEP data encryption as 40-bit WEP data encryption since the user-configurable portion of the encryption key is 40 bits wide.

Networks, Routing, and Firewall Basics

B-13

Image 83
Contents NETGEAR, Inc Trademarks World Wide Web Page Contents USB Appendix a Appendix C Contents Contents Typographical Conventions About This ManualAudience Technical Support Special Message FormatsBuilt-in Cable Modem Key FeaturesChapter Introduction About the CG814M Gateway802.11b Standards-based Wireless Networking Powerful, True FirewallContent Filtering Protocol Support Configurable Auto Uplink Ethernet ConnectionUSB Port Easy Installation and Management Firewall’s Front Panel What’s in the Box?LED Descriptions CG814M Gateway Rear Panel Gateway’s Rear PanelIntroduction Computer Requirements Connecting the Gateway to the InternetWhat You Will Need Before You Begin LAN Hardware RequirementsWhere Do I Get the Internet Configuration Parameters? LAN Configuration RequirementsInternet Configuration Requirements Connecting the Gateway to the Internet Record Your Internet Connection Information Connecting to Your Computer Connecting the CG814M GatewayUSB EthernetWireless Connecting to your Cable Service ProviderLog in to the Gateway Connecting the Power AdapterLogin window opens as shown in -3below Connect to the Internet Configuration Connecting the CG814M Gateway to the InternetConnecting the Gateway to the Internet Connecting the Gateway to the Internet Connecting the Gateway to the Internet Security Chapter Wireless ConfigurationConsiderations For a Wireless Network Placement and Range Wireless SettingsRestricting Wireless Access by MAC Address Wireless SettingsConfiguring Wired Equivalent Privacy WEP Wireless Configuration Wireless Configuration Chapter Protecting Your Network Protecting Access to Your CG814M GatewayChanging the Built-In Password Set Password menu Blocking Keywords, Sites, and ServicesBlock Keywords and Domains Click on the Block Sites link of the Content Filtering menu Proxy Blocking ServicesCookies Port BlockingPort Blocking menu Port ForwardingTo forward inbound traffic Considerations for Port Forwarding Port TriggeringTo configure Port Triggering Respond to Ping on Internet WAN Port Setting Up a Default DMZ HostProtecting Your Network Network Status Information Chapter Managing Your NetworkThis screen shows the following parameters Viewing Gateway StatusMenu 3.2 Router Status Fields Connection screen Connection StatusCurrent System Time Configuring LAN IP SettingsLAN IP Setup Use router as Dhcp server DhcpLogs menu Viewing and Emailing Logged InformationEnabling Logs Event E-mail Notification Erasing ConfigurationDiagnostics menu Running Diagnostic UtilitiesManaging Your Network Basic Functions Chapter TroubleshootingLocal Link LEDs Not On Power LED Not OnTest LED Stays On Cable Link LED Not On Troubleshooting the Web Configuration InterfaceTesting the LAN Path to Your Gateway Troubleshooting the ISP ConnectionTroubleshooting a TCP/IP Network Using a Ping Utility Testing the Path from Your PC to a Remote Device Troubleshooting TCP/IP Appendix a Technical SpecificationsTechnical Specifications Related Publications Basic Router Concepts Appendix B Networks, Routing, and Firewall BasicsIP Addresses and the Internet What is a Router?Routing Information Protocol Three Main Address Classes Equals NetmaskExample of Subnetting a Class B Address Subnet AddressingNetmask Notation Translation Table for One Octet Private IP Addresses Single IP Address Operation Using NAT Single IP Address Operation Using NATRelated Documents MAC Addresses and Address Resolution ProtocolDomain Name Server IP Configuration by DhcpInternet Security and Firewalls Stateful Packet Inspection What is a Firewall?Denial of Service Attack Infrastructure Mode Wireless NetworkingWireless Network Configuration Ad-hoc Mode Peer-to-Peer WorkgroupAuthentication and WEP Encryption Extended Service Set Identification EssidTable B-1 802.11b Radio Frequency Channels Wireless Channel SelectionEthernet Cabling Uplink Switches and Crossover CablesCable Quality Preparing Your Computers for TCP/IP Networking Appendix C Preparing Your NetworkInstall or Verify Windows Networking Components Configuring Windows 95, 98, and ME for TCP/IP NetworkingPreparing Your Network Selecting Windows’ Internet Access Method Enabling Dhcp to Automatically Configure TCP/IP SettingsVerifying TCP/IP Properties Configuring Windows NT, 2000 or XP for IP NetworkingMacOS 8.6 or Configuring the Macintosh for TCP/IP NetworkingMacOS Verifying TCP/IP Properties for Macintosh Computers Verifying the Readiness of Your Internet Account What Is Your Configuration Information?Mail.xxx.yyy.com Preparing Your Network Restarting the Network Glossary Networks See Network Address Translation Connection