NETGEAR WGR614v7 manual Appendix D, Wireless Networking Basics, Glossary, Contents, April

Models: WGR614v7

1 154
Download 154 pages 30.59 Kb
Page 9
Image 9

Are Login Protocols Used?

C-20

What Is Your Configuration Information?

C-20

Obtaining ISP Configuration Information for Windows Computers

C-21

Obtaining ISP Configuration Information for Macintosh Computers

C-22

Restarting the Network

C-23

Appendix D

 

Wireless Networking Basics

 

Wireless Networking Overview

D-1

Infrastructure Mode

D-1

Ad Hoc Mode (Peer-to-Peer Workgroup)

D-2

Network Name: Extended Service Set Identification (ESSID)

D-2

Authentication and WEP Data Encryption

D-2

802.11 Authentication

D-3

Open System Authentication

D-3

Shared Key Authentication

D-4

Overview of WEP Parameters

D-5

Key Size

D-6

WEP Configuration Options

D-7

Wireless Channels

D-7

WPA and WPA2 Wireless Security

D-8

How Does WPA Compare to WEP?

D-9

How Does WPA Compare to WPA2 (IEEE 802.11i)?

D-10

What are the Key Features of WPA and WPA2 Security?

D-10

WPA/WPA2 Authentication: Enterprise-level User

 

Authentication via 802.1x/EAP and RADIUS

D-12

WPA/WPA2 Data Encryption Key Management

D-14

Is WPA/WPA2 Perfect?

D-16

Product Support for WPA/WPA2

D-16

Supporting a Mixture of WPA, WPA2, and WEP Wireless Clients is Discouraged D-16

Changes to Wireless Access Points

D-17

Changes to Wireless Network Adapters

D-17

Changes to Wireless Client Programs

D-18

Glossary

 

Contents

ix

April 2006

Page 9
Image 9
NETGEAR WGR614v7 manual Appendix D, Wireless Networking Basics, Glossary, Contents, April