Contents v
M-10181-03
Appendix A
Specifications
Specifications for the WG602 v2 ........... ........................................................................ A-1
Appendix B
Wireless Networking Basics
Wireless Networking Overview ...................................................................................... B-1
Infrastructure Mode ...................................................................... ........................... B-1
Ad Hoc Mode (Peer-to-Peer Workgroup) ................................................................ B-2
Network Name: Extended Service Set Identification (ESSID) ................................B-2
Wireless Channels ............................................. .... ... ... ... .... ....................................B-2
WEP Wireless Security .................................................................................................. B-4
WEP Authentication ........................................ ... .... ................................................. B-4
WEP Open System Authentication ......................................................................... B-5
WEP Shared Key Authentication .... ........................................................................ B-6
Key Size and Configuration ................................................ ..............................B-7
How to Use WEP Parameters ................................................................................. B-8
WPA Wireless Security .................................................................................................. B-8
How Does WPA Compare to WEP? ........................................................................ B-9
How Does WPA Compare to IEEE 802.11i? ........................................................B-10
What are the Key Features of WPA Security? ...................................................... B-10
WPA Authentication: Enterprise-level User
Authentication via 802.1x/EAP and RADIUS .................................................. B-12
WPA Data Encryption Key Management ........................................................ B-14
Is WPA Perfect? .................................................................................................... B-16
Product Support for WPA ...................................................................................... B-16
Supporting a Mixture of WPA and WEP Wireless Clients ...............................B-16
Changes to Wireless Access Points ............................................................... B-16
Changes to Wireless Network Adapters ......................................................... B-17
Changes to Wireless Client Programs ............................................................ B-18
Appendix C
Network, Routing, Firewall, and Cabling Basics
Basic Router Concepts ....................................................................................... ...........B-1
What is a Router? . .................................................................................................. B-1
IP Addresses and the Internet ................................................................... .................... B-2
Netmask .................................................................................................................. B-4
Subnet Addressing ................................................................................................. .B-4