Reference Manual for the WG602 v2 54 Mbps Wireless Access Point
Is WPA Perfect?
WPA is not without its vulnerabilities. Specifically, it is susceptible to denial of service (DoS) attacks. If the access point receives two data packets that fail the Message Integrity Code (MIC) check within 60 seconds of each other then the network is under an active attack, and as a result, the access point employs counter measures, which includes disassociating each station using the access point. This prevents an attacker from gleaning information about the encryption key and alerts administrators, but it also causes users to lose network connectivity for 60 seconds. More than anything else, this may just prove that no single security tactic is completely invulnerable. WPA is a definite step forward in WLAN security over WEP and has to be thought of as a single part of an
Product Support for WPA
Starting in August, 2003, NETGEAR, Inc. wireless
WPA requires software changes to the following:
•Wireless access points
•Wireless network adapters
•Wireless client programs
Supporting a Mixture of WPA and WEP Wireless Clients
To support the gradual transition of
However, a mixed mode supporting WPA and
Changes to Wireless Access Points
Wireless access points must have their firmware updated to support the following:
Wireless Networking Basics |