Reference Manual for the NETGEAR ProSafe Wireless Access Point 802.11g WG302
Is WPA Perfect?
WPA is not without its vulnerabilities. Specifically, it is susceptible to denial of service (DoS) attacks. If the access point receives two data packets that fail the message integrity code (MIC) within 60 seconds of each other, then the network is under an active attack, and as a result, the access point employs counter measures, which include disassociating each station using the access point. This prevents an attacker from gleaning information about the encryption key and alerts administrators, but it also causes users to lose network connectivity for 60 seconds. More than anything else, this may just prove that no single security tactic is completely invulnerable. WPA is a definite step forward in WLAN security over WEP and has to be thought of as a single part of an
Product Support for WPA
Starting in August, 2003, NETGEAR, Inc. wireless
WPA requires software changes to the following:
•Wireless access points
•Wireless network adapters
•Wireless client programs
Supporting a Mixture of WPA and WEP Wireless Clients is Discouraged
To support the gradual transition of
However, a mixed mode supporting WPA and
Wireless Networking Basics |
September 2004