Contents ix
202-10099-01, April 2005
Are Login Protocols Used? .......... .........................................................................C -20
What Is Your Configuration Information? .............................................................. C-20
Obtaining ISP Configuration Information for Win do ws C om pu ters .......................C -21
Obtaining ISP Configuration Information for Ma cintos h C om pu ters .....................C -22
Restarting the Network ................................................................................................ C-23
Appendix D
Wireless Networking Basics
Wireless Networking Overview ...................................................................................... D -1
Infrastructure Mode ................................................................................................. D -1
Ad H oc Mode (P eer-to-Peer Workgroup) ............................................................... .D -2
Network Nam e: Extended S ervice Set Identification (ESS ID) ................................ D -2
Authentication and W EP Data Encryption .................................................... ... ... .... ... ... . D -2
802.11 A uthentication .............................................................................................. D-3
Open S ystem A u thentication ...................................................................................D -3
Shared Key A uthentication ......................................................................................D -4
Overview of W EP Parameters ................................................................................ D-5
Key Size .................................... .............................................................................. D-6
WE P C onfiguration Options .................................................................................... D-7
Wireless Channels ......................................................................................................... D-7
WP A and W PA 2 Wireless Security ................................................................................ D-8
How D oes WPA Compare to W EP ? ....................................................................... .D -9
How Does WPA Compare to WPA2 (IEEE 802.11i)? ............................................D -10
What are th e Key Features of WPA and W PA2 S ecurity? .................................... D -10
WPA/WPA2 Authentication: Enterprise-level User
Authentication via 802.1x/EA P and RA D IUS .................................................. D-12
WP A/WP A2 D ata Encryption Key M anagement ............................................. D -14
Is WP A/WPA 2 P erfect? .................................................................................... ... .. D -16
Product Support for W PA /WPA 2 ......................................... ..................................D -16
Supporting a Mixture of WPA, WPA2, and WEP Wireless Clients is Discouraged D-16
Changes to Wireless Access Points ............................................................... D -17
Changes to Wireless Network A dapters .......................................... ...............D -17
Changes to Wireless Client Programs ............................................................ D-18
Glossary