Reference Manual for the 54 Mbps Wireless Router with Phone Adapter WGR826V
Is WPA/WPA2 Perfect?
WPA/WPA2 is not without its vulnerabilities. Specifically, it is susceptible to denial of service (DoS) attacks. If the access point receives two data packets that fail the message integrity code (MIC) within 60 seconds of each other, then the network is under an active attack, and as a result, the access point employs counter measures, which include disassociating each station using the access point. This prevents an attacker from gleaning information about the encryption key and alerts administrators, but it also causes users to lose network connectivity for 60 seconds. More than anything else, this may just prove that no single security tactic is completely invulnerable. WPA/WPA2 is a definite step forward in WLAN security over WEP and has to be thought of as a single part of an
Product Support for WPA/WPA2
Starting in August, 2003, NETGEAR, Inc. wireless
WPA/WPA2 requires software changes to the following:
•Wireless access points
•Wireless network adapters
•Wireless client programs
Supporting a Mixture of WPA, WPA2, and WEP
Wireless Clients is Discouraged
To support the gradual transition of
However, a mixed mode supporting WPA/WPA2 and
Wireless Networking Basics |