
User Manual for the NETGEAR RangeMax™ Wireless USB 2.0 Adapter WPN111
With 802.11 and WEP, data integrity is provided by a
With WPA, a method known as Michael specifies a new algorithm that calculates an
•AES Support
One of the encryption methods supported by WPA beside TKIP is the advanced encryption standard (AES), although AES support will not be required initially for
Is WPA Perfect?
WPA is not without its vulnerabilities. Specifically, it is susceptible to denial of service (DoS) attacks. If the access point receives two data packets that fail the Message Integrity Code (MIC) check within 60 seconds of each other then the network is under an active attack, and as a result, the access point employs counter measures, which includes disassociating each station using the access point. This prevents an attacker from gleaning information about the encryption key and alerts administrators, but it also causes users to lose network connectivity for 60 seconds. More than anything else, this may just prove that no single security tactic is completely invulnerable. WPA is a definite step forward in WLAN security over WEP and has to be thought of as a single part of an
Product Support for WPA
Starting in August, 2003, new NETGEAR, Inc.
WPA requires software changes to the following:
•Wireless access points
B | W ire le ss N e tworkin g B a sics |